Skip to main content

Ethical hacking with full description in securetecho

                           ETHICAL HACKING


ethical hackingEthical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackersEthical hacking is also known as penetration
testing.An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

TOOLS FOR ETHICAL HACKING:

         
  •     NMAP. Nmap stands for Network Mapper. ...
  •     Metasploit. Metasploit is one of the most powerful exploit tools. ...
  •     Burp Suit. Burp Suite is a popular platform that is widely used for performing security            testing of web applications. ...
  •     Angry IP Scanner. ...
  •     Cain & Abel. ...
  •     Ettercap. ...
  •     EtherPeek. ...
  •     SuperScan.

MAIN PURPOSE OF ETHICAL HACKER:

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purposeof finding security vulnerabilities that a malicious hacker could potentially exploit.

TYPES OF HACKERS:  

  • Script Kiddie: Script Kiddies don't really care about hacking into systems and stealing things.
  • White Hat: White Hat hackers are also known as ethical hackers, and they're the good guys of the hacker world.
  • Black Hat.
  • Grey Hat.
  • Green Hat.
  • Red Hat.
  • Blue Hat.


TO KNOWS ABOUT THE WHOLE DISCRIPTION OF ETHICAL HACKING OR THE DIFFERENT TYPES OF ATTACKS GO TO THID PAGE OR LINK:                                               www.securetecho.tk






Comments

  1. Thanks for Sharing This Article. It was a valuable content. I hope these Commenting lists will help to my website.
    Amazon web services Training in chennai

    Amazon web services Course in chennai

    ReplyDelete

Post a Comment

Popular posts from this blog

how to crack wifi password using fern wifi cracker in securetecho

HOW TO HACK wifi USING fern wifi cracker Step 1 –  Go to Backtrack - Exploitation Tools - Wireless Exploitation Tools - WLAN Exploitation - Fern Wi-Fi Cracker.   Now following application will be seen.                                     Step 2 - Now select the interface as wlan0 and Refresh it.   Now click on “OK” after the box appears.    Step 3 –    Now click on “Scan for Access points”    Step 4 –  After that it will show list of Detected signals    Step 5 –     Now click on WEP box                                    Following screen will show like this.    Step 6 –  Now choose the Attack option as you wish to do like,  A. Arp Reques...

Best Places to Visit in Ludhiana – Top Attractions for Every Traveler

Introduction 1. Punjab Agricultural University (PAU) Nestled in the heart of Ludhiana, Punjab Agricultural University (PAU) is a renowned educational institution with sprawling green lawns and beautiful gardens. The campus is a peaceful retreat and perfect for a relaxing walk. Don’t forget to visit the Rural Museum located within PAU, showcasing Punjab’s rural heritage and agricultural history. Keywords: Punjab Agricultural University, Ludhiana attractions, educational institutions in Ludhiana. 2. Gurudwara Shri Alamgir Sahib One of the most significant religious sites in Ludhiana is Gurudwara Shri Alamgir Sahib . Known for its historical importance, this Gurudwara offers a peaceful and spiritual experience. It's a must-visit for anyone seeking tranquility and insight into the Sikh heritage. Keywords: Gurudwara Shri Alamgir Sahib, religious places in Ludhiana, Sikh heritage. 3. Rural Museum The Rural Museum at PAU is a unique destination where you can explore the traditional r...