Ethical Hacking - Overview - Ethical Hacking Tutorial
An Ethical Hacking is used to find vulnerabilities (weakness in computer system) and to improve security of the system by fixing vulnerabilities.
Ethical Hacking is also known as White Hat Hacking or Penetration Testing.
Types Of Hacking
We can define hacking into different categories, based on what is being hacked-
- Webiste Hacking- It means taking unauthorised control over a web server , databases and making a change in informations.
- Network Hacking- It is about gathering information of a network by using Ping , NSLookup ,Tracert, Netstat, etc.
Then this information is being used to target or harm network system.
- Email Hacking – It means taking unauthorised access to email account without the permission of owner.
- Password Hacking – It is process of recovering secret password from the data that is already stored in system. For Example chrome browser used to store username and password for quick login.
- Computer Hacking – It is a process of stealing computer ID and Password from PC by unauthorised user, using hacking method.