Ethical Hacking:
These are various types of hackers:
- White Hat Hackers (Cyber-Security Hacker)
- Black Hat Hackers (Cracker)
- Gray Hat Hackers (Both)
White Hat Hackers:
Here, we look for bugs and ethically report them to the organization. We are authorized as a user to test for bugs in a website or network and report it to them. White hat hackers generally get all the needed information about the application or network to test for, from the organization itself. They use their skills to test it before the website goes life or is attacked by malicious hackers.Black Hat Hackers:
Here, the organization doesn’t allow the user to test it. They unethically enter inside the website and steal data from the admin panel or manipulate the data. They only focus on themselves and the advantages they will get from the personal data for personal financial gain. They can cause major damage to the company by altering the functions which leads to the loss of the company to a much higher extent. This can even lead you to extreme consequences.Grey Hat Hackers:
They sometimes access to the data and violates the law. But never have the same intention as Black hat hackers, they often operate for the common good. The main difference is that they exploit vulnerability publicly whereas white hat hackers do it privately for the company.The organization gives official permission to access something or do something with the network or application. For example, suppose an organization XYZ gives you permission to access the admin panel and to make changes for the organization.
Some Important terms in Ethical Hacking Authorization:
Authentication:
It ensures and confirms the user identity to enter the system. For example, to enter the examination hall you need to show your identity card. In the same way, you need to confirm your identity by logging in with your credentials to enter the system.Vulnerability Assessment:
To identify the risks or threats in the network or web application. If any vulnerability is found, it will enable the hacker to access the data and manipulate it. So, Vulnerability Assessment can help organizations to make their web applications and networks more secure when tested by white hat hackers.Penetration Testing:
Vulnerability Assessment includes Penetration testing or pen testing, i.e., identifying vulnerabilities in a network or applications by testing it. The main goal of pen testing is to find vulnerable loopholes in applications and patch them to avoid black hat hackers to exploit them. So, by pen testing, you can secure a web application and network and therefore it is one of the most important terms in ethical hacking.☠🔰Pulkit Saini🔰☠
☠💀Nothing is Impossible in front of me💀☠
☠💀This is Only For Educational Purpose 💀☠
Owner Made with ❤️ by Pulkit Saini
For Your Support:-
Subscribe to my YouTube Channel:- https://www.youtube.com/pulkitpy
Follow me on Instagram:-https://www.instagram.com/pulkit_py/
Follow us on Instagram:- https://www.Instagram.com/pulkitpy
Follow us on Github:- https://github.com/Pulkit-Py
Join Us on Telegram:- https://t.me/pulkit_py
0 Comments