ethical hacker

What is Hacking? I welcome you to my blog. Friends, I try to make the post written by me hundred percent correct. So that you can get the correct information and make it easy to read. Bahral, ​​we go to our topic. Today's topic is related to hacking. So friends, today we will know what hacking is. What are the types of hackers. How is hacking done?

Nowadays the use of Computer and Smartphone is increasing very fast. It is almost impossible for people to do their work without Smartphone and Computer. Whether it is own business or working in a company / bank.

Computer is used everywhere, computer is used for doing small things. Many problems have to be faced while doing the same work, in such a situation, when we are talking about computers, then the matter of cyber crime also becomes necessary.

Friends, you must have heard about Cyber ​​Crime. If you have not heard, then I want to tell that Cyber ​​Crime is a type of crime in which hackers steal personal details or data of others using computers. Due to which the people suffer heavy losses. And blackmail them and grab lakhs of rupees. Due to cyber crime many organizations have to pay crores of rupees every year due to their data being stolen.

Hacking means to find a weakness in a computer's system and take advantage of that weakness and hack that system. The person or person who is hacked by this person, we call it a Hacker. A Hacker has all kinds of knowledge related to the computer, that is why he can easily make Valunerbility from someone's computer system. On hearing the name, we realize that this is a wrong thing.


Types Of Hacking

Network Hacking
This type of Hacking means that it receives all the information over the Hacker Network itself, for which many tools are available such as -Telnet, NS, Lookup, Ping, tracert, Netstat etc. Its main purpose is only to reach the network system and its operation. 

Website Hacking:
 In website hacking illegally gaining control over the association of its web server and website, ie Database or Interface.

Email Hacking :
In email hacking, Hacker creates a duplicate phishing page that reaches the user to that phishing page, if the user enters information then the email ID gets hacked. It is used in illegal works in an unauthorized manner.

Ethical Hacking :
This type of Hacking goes into many ethical tasks. In this Hacking, First Owner's Permission is taken by hacker to find Weakness in the system and Owner is helped in removing these Weakness.

Password Hacking:
In this type of Hacking, passwords are cracked in an unauthorized manner, in which the system is hacked by stealing secret passwords kept in the computer.

Computer System Hacking : 
In this type of hacking, the hacker knows the ID and password of the system of a computer and uses the computer illegally in a sequre connection. He deletes 2 files sitting at one place and also steals the data.


What are the types of hackers?

1. Black Hat Hacker : 
Blackmailed Hat Hacker illegally gains the IDs and passwords of your website, Computer System, Android Smartphone, Facebook etc. without your permission. And assert their authority over the information kept in them. Whether he deletes them or demands a ransom from the owner, Black Hat Hacker are very bloodthirsty. They do not hesitate at all to harm others.

2. White Hat Hacker :
White Hat Hacker does hacking in an ethical way. Hackers of this category provide protection to our system, website and smartphone from being hacked. Such hackers take permission from the owner of the system and help us in protecting from the attacker. White hat hacker check the security of our website or system. This tells whether the system is a sequer or not. Finds weakness and provides sequrity. It is also called ethical hacker.

3. Gray Hat Hacker :
Gray Hat Hacker is actually in a state of confusion. They may or may not play with anyone without permission. By the way, it can hack anyone's system to improve their skills but they do not harm anything but they cannot be called hum white hat hackers and not black hat hacker. They are a combination of both. Apart from this, there are hacker whose work is different, let's know.

4. Misscellaneous Hacker:

white hat hacker class can be a different thing for their hacking methods. Let's know Red hat hacker

Red hat Hacker is a combination of White Hat Hacker and Black Hat Hacker. These types of hackers are only involved in stealing the top secret of Govt Agency. The target is either a government agency or they hack the data of an organization.


Blue Hat Hacker The work of blue hat hacker only has to work like a freelancer, they have full knowledge of Networking Security. Their task is only to know the loop holes of the products, they are made available to the beta version of the products on behalf of the company, they help the companies. In return, a good amount is available in $.

Ethical Hacker Basic Terms

Adware : Adware is software designed in a way that prevents pre-chosen-ads from appearing on the screen.

Clone phishing : It is used to hack the login id and password of a social account by sending a duplicate page so that the user fills in their sensitive information and gets hacked.

Firewall : A firewall is a type of filter that is used only for files and intrducer. Virus Virus system is used to hang, this encrypts the entire system. 

Vulnerability : Vulnerability refers to the weakness present in the system, causing hackers to allow access the system.