Friday, July 15, 2016

What Is Ethical Hacking

What is Ethical Hacking?
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.

Why "ETHICAL"?
hacker is someone who seeks and exploits weaknesses in a computer system or computer network Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them

According to Ralph D. Clifford, a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system". These subgroups may also be defined by the legal status of their activities.


White hat

white hat hacker breaks security for non-malicious reasons, either to test their own security system, perform penetration tests or vulnerability assesments for a client - or while working for a security company which makes security software. The term is generally synonymous with ethical hacker, and the EC-Council, among others, have developed certifications, courseware, classes, and online training covering the diverse arena of ethical hacking.

Black hat

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of hacker culture, or the ethos of the white hat hacker who performs hacking duties to identify places to repair. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".

Grey hat

A grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.[20] Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical.

Elite hacker

social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.[21]

Script kiddie

Script Kiddie (also known as a skid or s kiddie) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature), usually with little understanding of the underlying concept.

Neophyte

A neophyte ("newbie", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.

Blue hat

blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Hacktivist

A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.
Hacktivism can be divided into two main groups:
Freedom of information — Making information that is not public, or is public in non-machine-readable formats, accessible to the public.

I am personally a White hat Hacker with a future certification of Certified Ethical Hacker V9.0 By Ankit Fadia and a Web Developer and Mobile App Developer.


          - AgnidhraChakraborty
                                                                                            http://agnidhrashim.wix.com/ethical-hacker
                                                                        Email: agnidhrashim@gmail.com

                                                                       Call me : 9735689898

1 comment:

  1. "SSN LEADS/FULLZ AVAILABLE"
    "TOOLS & TUTORIALS AVAILABLE"

    ***Contact Details***
    =>Telegram > @leadsupplier
    =>ICQ > 752822040
    =>Skype > Peeterhacks
    =>Wicker me > peeterhacks

    **************************************
    >>SSN DOB DL FULLZ with complete info
    >>CC With CVV (vbv & non vbv)
    >>FULLZ FOR SBA, PUA & TAX RETURN FILLING
    >>I.D Photos Front & Back
    >>High Credit fullz
    >>Premium Fullz

    ***************************************
    All Types of Tools & Tutorials Available

    "SPAMMING" "ETHICAL HACKING" "CARDING" "CASHING"
    "KALI LINUX" "SCRIPTING"

    "OTHER STUFF"
    =>BTC Flasher/Cracker
    =>SQL Injector
    =>Logins
    =>SMTP Linux Root
    =>DUMPS with pins track 1 and 2 with & without pin
    =>SMS Sender & Email Blaster
    =>Server I.P's & Proxies
    =>HQ Email Combo

    =>Telegram > @leadsupplier
    =>ICQ > 752822040
    =>Skype > Peeterhacks
    =>Wicker me > peeterhacks

    *Serious buyers will always welcome
    *Price will be reduce in bulk order
    *Hope we do a great business together

    ReplyDelete