Introducation to Hacking | Types Of Hackers? | Phases of Hacking? Today I am going to tell you about hacking with the help of this article? What is hacking? And how many types are there. I am going to tell you about them with full details.
Table of Contents
Introducatio to Hacking:-
Hacking simple refers to “Gaining Unauthorized Access Into A System” Or We can also say that main aim of hacking is “To compromise the security of a system in order to gain access into it”
In India hackers are treated asa criminals by those who are not familiar with working of a hacker. They only see -ve side of hacker. That’s why india have less hackers as compared to other developing and developed countries.
In India, ETHICAL HACKER are also known as information security expert of cyber security analyst.
Types of Hackers:
1. White Hat Hacker:
Hacker who works defensively, They perform hacking and security checks with authority. They are known for security.
2. Black Hat Hacker:
Hacker who works offensively. They believe in breaking the security without any permission or authority. They are known as malicious hackers.
Read them too:-
- How To Earn Money By Maxnerwellness? | Referral Code
- YouTube Video Builder Tool Ka Access Kaise Le? (YouTube Beta Builder)
3. Grey Hat Hacker:
Hacker who is like a coin, two sided. They work for both offensive and defensive work. Generally benefit oriented.
Phases of Hacking:

1. Reconnaissance:
In this phase, Attack find information about Target. It can be done actively or passively . It brings us closer to the target by giving some sensitive information about target.
Read them too:-
2. Scanning:
In This phase , Attacker find much more information about target. Attacker can perform port scanning or various assessments in order to get sensitive information about target.
3. Gaining Access:
In this phase, Attacker actually performs HACK using the information or vulnerability found by previous phase, attacker takes advantage and perform exploit to gain access.
4. Maintaining Access:
In this phase, Attacke installs backdoors or trojans in order to maintain access into the target system.
5. Covering Tracks:
In this phase, Attacker deletes the logs and session details in order to not be get caught.
All these phase are interdependent on each other.
Read them too:-
Cyber Laws in India when internet was developed, the founding fathers of internet hardly had any inclination that internet could transform itself into an all pervading revolution which could be misused for criminal artivities and which required regulation.
Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence have been grossly misusing this aspect of the internet to perpetuate criminal activities in cyberspace. Hance the need for Cyber laws in india.
I hope you liked Introducation to Hacking | Types Of Hackers? | Phases of Hacking? post. If you like it, do not forget to share it on social media.
Leave a Reply