What does it means ???
computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. While “hacker” can refer to any skilled computer programmer, the term has become associated in popular culture with a “security hacker“, someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.  (Reference from wikipedia)

Hacking can also refered to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.

   Which type of hacker’s ???

3 types of hacker

  1. Black hat
  2. White hat
  3. Gray hat

Cybrary hub explains Hacking  – How things are Work !

   Hackers deploy a variety of techniques for hacking –

  1. Vulnerability scanner– Is a Automated scanner who find computers and networks known weaknesses
  2. Password cracking: The process of retrieve password hash then decryption of hashes is called password cracking.
  3. Packet sniffer: an applications that capture data packets to view data and passwords in transmit over networks.
  4. Spoofing attack: Spoofing is when a hacker impersonates another device or user on a network in order to steal data, spread                                                     malware,or  bypass access controls. The most common forms are IP spoofing, email spoofing, and DNS spoofing.
  5. Root kit: represents a set of programs which work to subvert control of an operating system from legitimate operators
  6. Trojan horse: serves as a back door in a computer system to allow an intruder to gain access to the system later
  7. Viruses: self-replicating programs that spread by inserting copies of themselves into other executable code files or documents
  8. Key loggers: tools designed to record every keystroke on the affected machine for later retrieval

Certain corporations employ hackers as part of their support staff. These legitimate hackers use their skills to find flaws in the company security system, thus preventing identity theft and other computer-related crimes.

NOTEHacking is not a skill, It’s a Extreme knowledge, hacking is like a gun you can use for self-defense and attacking some one..


How to change MAC Address in Linux Operating system - Cybrary india · 19th October 2018 at 9:40 pm

[…] Let’s find out the Hardware address, ifconfig command to check the ip address and hardware Address of available sources. You can change your mac address while learning Ethical Hacking. […]

Raven: 1 vulnhub Walkthrough step-by-step - Cybrary india · 19th November 2018 at 5:16 pm

[…] Ethical Hacking skills […]

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: