Cyber Security

  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • MOBILE
  • COMPUTER
  • NETWORKING
  • HACKING
  • OTHER
    • TECH HACK
    • SOCIAL MEDIA TRICKS
    • TECHNICAL KNOWLEDGE

Introducation to Hacking | Types Of Hackers? | Phases of Hacking?

Author: yadram | On:1st Sep, 2020| Comments: 0

Introducation to Hacking | Types Of Hackers? | Phases of Hacking? Today I am going to tell you about hacking with the help of this article? What is hacking? And how many types are there. I am going to tell you about them with full details.

Table of Contents

  • Introducatio to Hacking:-
  • Types of Hackers:
    • 1. White Hat Hacker:
    • 2. Black Hat Hacker:
    • 3. Grey Hat Hacker:
  • Phases of Hacking:
  • All these phase are interdependent on each other.

Introducatio to Hacking:-

Hacking simple refers to “Gaining Unauthorized Access Into A System” Or We can also say that main aim of hacking is “To compromise the security of a system in order to gain access into it”

In India hackers are treated asa criminals by those who are not familiar with working of a hacker.  They only see -ve side of hacker. That’s why india have less hackers as compared to other developing and developed countries.

In India, ETHICAL HACKER are also known as information security expert of cyber security analyst.

Types of Hackers:

1. White Hat Hacker:

Hacker who works defensively, They perform hacking and security checks with authority. They are known for security.

2. Black Hat Hacker:

Hacker who works offensively. They believe in breaking the security without any permission or authority. They are known as malicious hackers.

Read them too:-

  • How To Earn Money By Maxnerwellness? | Referral Code
  • YouTube Video Builder Tool Ka Access Kaise Le? (YouTube Beta Builder)

3. Grey Hat Hacker:

Hacker who is like a coin, two sided. They work for both offensive and defensive work. Generally benefit oriented.

Phases of Hacking:

Introducation to Hacking | Types Of Hackers? | Phases of Hacking?
Introducation to Hacking | Types Of Hackers? | Phases of Hacking?

1. Reconnaissance:  

In this phase, Attack find information about Target. It can be done actively or passively . It brings us closer to the target by giving some sensitive information about target.

Read them too:-

  • What Is AI? | Artificial Intelligence Kya Hai?
  • Top Latest Technology Trends In Hindi (2020)

2. Scanning:

In This phase , Attacker find much more information about target. Attacker can perform port scanning or various assessments in order to get sensitive information about target.

3. Gaining Access: 

In this phase, Attacker actually performs HACK using the information or vulnerability found by previous phase, attacker takes advantage and perform exploit to gain access.

4. Maintaining Access:

In this phase, Attacke installs backdoors or trojans in order to maintain access into the target system.

5. Covering Tracks: 

In this phase, Attacker deletes the logs and session details in order to not be get caught.

All these phase are interdependent on each other.

Read them too:-

  • Facebook account hack kaise kare (2020)?
  • 108 MP camera quality? | Camera quality factors in hindi

Cyber Laws in India when internet was developed, the founding fathers of internet hardly had any inclination that internet could transform itself into an all pervading revolution which could be misused for criminal artivities and which required regulation.

Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence have been grossly misusing this aspect of the internet to perpetuate criminal activities in cyberspace. Hance the need for Cyber laws in india.

I hope you liked Introducation to Hacking | Types Of Hackers? | Phases of Hacking?  post. If you like it, do not forget to share it on social media.

Please Share
Previous Post
Next Post

Reader Interactions

  • Advantages of fiber Optics? Fiber Optics Working

    Advantages of fiber Optics? Fiber Optics Working

  • How to Hack Facebook Account in 2021

    How to Hack Facebook Account in 2021

  • What is Ethical Hacking?  |  Vulnerability Management Tools

    What is Ethical Hacking? | Vulnerability Management Tools

  • How to Hack Instagram Account 2021

    How to Hack Instagram Account 2021

  • What is SQL injection? | How  SQL Injection Attacks Work?

    What is SQL injection? | How SQL Injection Attacks Work?

  • What is Session Hijacking? | Types of  Session Hijacking?

    What is Session Hijacking? | Types of Session Hijacking?

Leave a Reply Cancel reply

Primary Sidebar

Follow on Social media

Latest Post

  • Advantages of fiber Optics? Fiber Optics Working
  • How to Hack Facebook Account in 2021
  • What is Ethical Hacking? | Vulnerability Management Tools
  • How to Hack Instagram Account 2021
  • What is SQL injection? | How SQL Injection Attacks Work?

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Categories

  • COMPUTER TRICKS (23)
  • HACKING (20)
  • MOBILE TECHNOLOGY (23)
  • NETWORKING (12)
  • SOCIAL MEDIA TRICKS (40)
  • TECH HACK (41)
  • TECHNICAL KNOWLEDGE (25)

Pages

  • Contact Us
  • Home
  • Disclaimer
  • About me
  • privacy Policy
  • Term and conditions
  • Networking
  • Blog

Footer

About Me

My name is yadram agnihotri. I have created this blog to connect everyone with technology. In this, through my little knowledge, I keep updating daily about social media tricks, tech hack, computer tricks, technical knowledge and mobile technology. So that everyone should be connected with technology. Read More…

yadram: View My Blog Posts

Categories

  • COMPUTER TRICKS (23)
  • HACKING (20)
  • MOBILE TECHNOLOGY (23)
  • NETWORKING (12)
  • SOCIAL MEDIA TRICKS (40)
  • TECH HACK (41)
  • TECHNICAL KNOWLEDGE (25)

Pages

  • About me
  • Blog
  • Contact Us
  • Disclaimer
  • Home
  • Networking
  • privacy Policy
  • Term and conditions
Copyright ©2020 Cyber Security