Hacking : The Basics(2019)

Introduction


Hi friends, In this session we will be starting our interesting journey of Being an absolute beginner to an expert in the field of Hacking. I will try my best to make this course Beginner friendly, So even if you are new in this field, you will be able to keep up with the course. And for any doubt, write it in comment box.

Who is a Hacker??? And Their Types

A Hacker is an individual who uses computer, networking or any other skills to overcome Technical problem. Well that's not what you have thought, many of you probably think of a person in Black hood inside a dark room, doing something illegal on screen. But that is not the whole story.                                                                        There are three types of Hackers: 


  • Black Hat : These people are the ones who do the illegal work like - Gaining unauthorized access to network or system with malicious intent, such as stealing data, spreading malware or profit from ransomware or any other reason. Just remember they do the illegal stuff.
  • White Hat : They are also known as Ethical Hackers, They work for corporates, companies, Govt. or as freelancer trying to improve your privacy and take security measures against The Black Hats. Their main job is doing Penetration Testing and find Vulnerabilities in systems network, etc.
  • Grey Hat : They are like mixture of Black and White Hats. They do Hacking for fun and personal interest, they do not harm any person or authority although they gain unauthorized access. I also came in this category but I always ask my friend first, If I can hack into his system just for training purpose.
  • There are some other types also like : Hacktivist, Phreaker, Script kiddies etc. But we will not go in dept of them. If you want you can Google other types of Hackers to know more about them.

Basic Hacking Terminologies

  • IP : An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.
  • Malware : Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network.
  • Ransomware : Ransomware is a type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
  • Spyware : spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information often, without your knowledge. Spyware is classified as a type of malware
  • Virus : A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  • Back-door : A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data. 
  • Brute Force Attack : A brute force attack is a trial and error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.
  • There are many other Terms that you should know as a Hacker like : Doxing, Phishing, spoofing, Trojan Horse, Whaling and many more. I will cover those in future post consisting all the Terms at one place. 

Summary

Today we learn about what is a Hacker? and different types of them and we also learn some common Hacking related Terms.
In the next upcoming post I will tell you how to setup your Desktop/Laptop to start our Hacking tutorial.


Note: I will not be responsible for anything illegal related and advise to all of you to do not do anything illegal.
Note: For any doubt or suggestion, write them down in comment section, I will try my best to respond to all of your comments.

Thanks!!!!

Comments

Popular Posts