![]() |
What is hacking? Types and Techniques |
There are plenty of hacking techniques are available outside.
If you wanna know something about hacking. You are at the right place!!!
Spend your 5 Minutes to know something about hacking, everything is easy when you started to listen. Hope you are listening!!!
Topics you gonna learn
- What is Hacking?
- Who is a Hacker?
- Types of Hackers
- Types of Hacking
- Steps To Prevent Hacking
Let's gets started!!!
What is Hacking?
Hacking is about finding vulnerability about the computer or a particular network and gaining access into it.Once the access is gained by the hackers then everything depends on him, he/she may get into the database and delete or steal some information about the particular system or network
or
he/she may find the vulnerability and intimate the authorized person of that particular system or network and provide some solution to prevent hacking.
Whenever you heard the word "HACKING" you may thought hacking was bad and it was done by some bad peoples. Hope now you realize the real meaning of hacking.
Hacking has both Good and Bad sides!!!
Who is a Hacker?
Everyone has their own identity here likewise the person who hacks he/she is a Hacker.
Using the vulnerability the hacker gets into the computer system or a network and gain the access.
Hacker must be technically strong and he/she must be a good programmer.
Good Hacker works to prevent hacking he/she is a ethical hacker or white hat hacker. Bad Hacker steals the data he/she is a cracker or black hat hacker.
Types of Hackers
There are many types in hackers because if you hack an app you may be called as app hacker likewise if you hack a browser you may be called as browser hacker. LOL!!!
So here you gonna see some common types of hackers.
Ethical Hacker/White Hat Hackers
Ethical Hacker/White Hat Hacker are the good hackers because they breaks into the system or network to find the vulnerability and secure it. They analyse everything and fix it.
Cracker/Black Hat Hacker
Cracker/Black Hat Hacker are the bad hackers just opposite to the ethical hacker/white hat hacker.
He/she steals everything to make the network or a system down or to demand the network's authorized person for a money terms.
Cracker are totally unauthorized he/she steals money from back accounts, corporate data etc...
Grey Hat Hacker
Grey Hat Hacker are the mixer of both white hat hacker and black hat hacker.
He/she gain the access in the unauthorized way and he/she may steals the data or secure the data. That depends on him/her.
Script Kiddies
Script Kiddies hacks the computer system or a particular network using tools.
He/she are not well versed in programming or any other technical skills.
Types of Hacking
Common Types of Hacking are
- Website Hacking
- E-mail Hacking
- Password Hacking
- Network Hacking
- Computer Hacking
- Ethical Hacking
- Online Banking Hacking
Website Hacking
Hacking a website means taking control from the website owner to a person who hacks the website.
E-mail Hacking
E-mail Hacking is illicit access to an email account or email correspondence.
Password Hacking
Password hacking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
Network Hacking
Network Hacking is generally means gathering information about domain by using tools like NS look Up, Ping etc... over the network.
Computer Hacking
Computer hacking is when files on your computer are viewed, edited or created without your authorization.
Ethical Hacking
Ethical hacking is where a person hacks to find weakness in a system and usually patches them.
Online Banking Hacking
Online banking hacking is the unauthorized accessing bank accounts without knowing the password or without permission of the account holder.
Steps to Prevent Hacking
- Use passwords that contains both capital and small letters also numbers and special characters.
- Turn on the anti-virus and firewall in your system.
- Back up your data in any removal device like pen-drive, CDs etc....
- Use 2-step-verification for logins. If someone signs in from a unauthorized device, they'll have to provide a code that's only sent to your phone or email address.
- Enable Login alerts if someone tries to login you'll get alert message.
- Enter Passwords only in https enabled websites.
What Is Hacking? | Types and Techniques [Updated]
Reviewed by aa
on
November 23, 2018
Rating:
![What Is Hacking? | Types and Techniques [Updated]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEaEXGOJUrXDf0Lyka7ghTIPOjIVWgHJataCCzrL98MpEVAm-nvzBA_q1ZnDYmevpRIMC5UB8WijbE7kKEZP2x5Y6un6jVOOjY9idD-Eb3gJR0SMuA8vWEgMQ3Hd5jM5DsBnpCOgv_DrE/s72-c/computer-hacking.jpg)
No comments: