Hacking is a very broad discipline and covers a wide range of topics like,

Website HackingEmail HackingComputer HackingEthical HackingEtc.

Read: What is Black Hat, Grey Hat or White Hat Hacker?

What is the meaning of Ethical Hacking

Ethical Hacking also known as Penetration Testing is an act of intruding/penetrating system or networks with the user’s consent. The purpose is to evaluate the security of an organization by exploiting the vulnerabilities in a way the attackers could exploit them. Thereby documenting the procedure of attack to prevent such instances in the future. Penetration testing can further be classified into three types. 1] Black box The penetration tester is not offered any details pertaining to the network, or infrastructure of the network. 2] Grey box The penetration tester has limited details about the systems to be tested. 3] White Box The penetration tester is also called as Ethical hacker. He is aware of the complete details of the infrastructure to be tested. Ethical hackers in most cases, use the same methods and tools used by the malicious hackers but with the permission of the authorized person. The ultimate objective of the whole exercise is to improve the security and defend the systems from attacks by malicious users. During the exercise, an ethical hacker may attempt to collect as much information as possible about the target system to find ways to penetrate the system. This method is also known as Footprinting.

There are two types of Footprinting–

Different Phases of Ethical Hacking

The different stages of Ethical Hacking include- 1] Reconnaissance The very first step of Hacking. It is like Footprinting, i.e., information gathering Phase. Here, usually, information related to three groups is collected. Ethical hackers also rely on social engineering techniques to influence end users and obtain information about an organization’s computing environment. However, they should not resort to evil practices such as making physical threats to employees or other types of attempts to extort access or information. 2] Scanning This phase involves- The role of an Ethical Hacker in cybersecurity is important since the bad guys will always be there, trying to find cracks, backdoors, and other secret ways to access data they shouldn’t. To encourage the practice of Ethical Hacking, there’s a good professional certification for ethical hackers – The Certified Ethical Hacker (CEH). This certification covers more than 270 attacks technologies. It is a vendor-neutral certification from the EC-Council, one of the leading certification bodies. Read next: Tips to keep Hackers out of your Windows computer.