Call Now

Send Message[email protected]

Our LocationHyderabad, Telangana

Complete Ethical Hacking Tutorial

1. Introduction of Hacking

  1. Hacking

Hacking is the process of exploiting system vulnerabilities and compromising security systems to gain unauthorized access to the system resources. It involves modifying system or application features to achieve a goal outside of the creator’s original purpose.

  •  Ethical Hacking

Ethical Hacking is the process to identify vulnerabilities to assure system security by use of hacking tools, tricks, and techniques. It focuses on simulating methods used by attackers to verify the existence of exploitable vulnerabilities in the system’s security.

  • Hacker

Hackers are intelligent individuals who spend enormous amounts of time exploring computing resources like networks, websites, mobile devices, etc.

  • Ethical Hacker

Ethical Hacker is an expert in computer internals and networking concepts, who tries to find out potential vulnerabilities on the target systems before a hacker could use, without actually doing any harm to the information systems on behalf of the owners of the IT Assets.

Types of Hackers

  • Black Hat (Crackers): Individuals utilize computing skills for malicious or destructive activities.
  • White Hat: Individuals utilizing hacking skills for the defensive purpose
  • Gray Hat: Individuals who work both offensively and defensively
  • Suicide Hackers: Hackers who aim to shut down the critical infrastructure for a cause and are not worried about facing punishment.
  • Script Kiddies: An unskilled hacker who compromises the system by running scripts, tools, and software developed by real hackers.

Cyber Terrorists: Individuals with hacking skills, motivated by religious or political beliefs to create fear by large-scale disruption of computer networks

  • Hacktivist: Hackers who promote a political agenda by hacking, especially by defacing or disabling websites.
  • Government Sponsored: Individuals employed by the government to penetrate and gain confidential information.

Types of Hacking:

  • Ethical Hacking: Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.
  • Computer Hacking: This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.
  • Website Hacking: Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.
  • Password Hacking: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • Network Hacking: Hacking a network means gathering information about a network by using tools like Nmap, Nessus, Openvas, Enumeration tools which are available in kali linux operating system etc. with the intent to harm the network system and hamper its operation.
  • Email Hacking: It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.

6. Why Ethical Hacking is Necessary

Ethical Hacker needs to think like malicious Hacker. Ethical hacking is necessary to defend against malicious hackers attempts, by anticipating methods they can use to break into a system.

  • To fight against cybercrimes.
  • To protect information from getting into the wrong hands.
  • To build a defensive mechanism that avoids hackers from penetrating.
  • To test the organization’s infrastructure security.

7. Steps to Perform Ethical Hacking

1.Reconnaissance refers to the pre-attack phase where an attacker observes a target before An attack. It may include the target organization’s clients, employees, operations, network, and systems

2. Scanning is the phase immediately preceding the attack. Here, the attacker uses the details gathered during reconnaissance to identify specific vulnerabilities. An attacker

3. Gaining Access In this phase in which real hacking occurs. Attackers use vulnerabilities identified during the reconnaissance and scanning phase to gain access to the target system or network. Attackers gain access to the target system locally, over a LAN, or over the Internet.

4. Maintaining Access of the target machine and remain undetected. Attackers install a backdoor or a Trojan to gain repeat access. They can also install rootkits at the kernel level to gain full administrative access to the target computer. Rootkits are used to gain access at the operating system level, while a Trojan horse gains access at the application level. Both rootkits and Trojans require users to install them locally.

5. Clearing Tracks is for avoiding legal trouble, attackers will overwrite the server, System and application logs to Avoid suspicion and erase all evidence of their actions. Attackers  can execute scripts in the Trojan or rootkit to replace the critical system and log files to hide their presence in the system.

   8. Terminology

Vulnerability: In simple words, vulnerability is a loophole, Limitation, or weakness  that becomes a source for an attacker to enter into the system.

Exploit: It is a software tool designed to take advantage of a aw (vulnerability) in a system for malicious purposes.

Payload: A payload is an action, or set of operations has to be done on the target, once the exploit successfully launched. It can be any control or Denial of service, etc.

Hack value: Hack value is a notion among the hackers that something is worth doing. Hackers may feel that breaking down robust network security might give them great satisfaction and that it is something they accomplished that not everyone could do.

Zero-day attack: In a 0-day attack, the attacker exploits the vulnerability before the software developer releases the Patch For them.

9. What is Information Security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, disclosure, disruption, destruction, modification, inspection,recording or destruction of information.Information security’s primary focus is the balanced protection of the confidentiality, integrity, and availability of data and focuses on efficient policy implementation,organization productivity.

Famouse and well known Hackers:

1. Kevin David Mitnick: Is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrested and five years in the prison for various computer and communications-related crimes .

He is the first hacker to have his face immortalized on an FBI “Most Wanted” poster. He was formerly the most wanted computer criminal in the history of United States

2.  Andrian Alfonso Lamo Atwood: He was an American threat analyst and hacker. Lamo first gained media attention for breaking into several high-profile computer networks, including those of The New York Times, Yahoo, and Microsoft, culminating in his 2003 arrest. Lamo was best known for reporting U.S. soldier Chelsea Manning to Army criminal investigators in 2010 for leaking hundreds of thousands of sensitive U.S. government documents to WikiLeaks. Lamo died on March 14, 2018 at the age of 37.

3. Jonathan Joseph James: He is a Gray Hat Ethical Hacker and he was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. In 1999 at the age of 16, he gained access to several computer’s by breaking the password of a server that belonged to NASA and stole the source code of the International Space Station among other sensitive information.


You need to add a widget, row, or prebuilt layout before you’ll see anything here. 🙂