Computer hacking refers to exploit vulnerabilities (weakness in system or network) compromising security controls to gain unauthorized or inappropriate use of computer and network resources for malicious intent. Hacking can be done to steal, redistribute, spoil intellectual property.
Introduction of Ethical Hacking
Ethical hacking is the activities or processes performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search vulnerabilities that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate or mitigate any potential attacks.
There are several classes of Hacker
White Hats: They use their hacking skills for defensive purposes. Nowadays, almost every organization has security analysts who are knowledgeable about hacking countermeasures, which can secure its network and information systems against malicious attacks.
Grey Hats: Gray hats hacker work both offensively and defensively at various times. Gray hats fall between white and black hats. Gray hats might help hackers in finding various vulnerabilities of a system or network and at the same time help vendors to improve products (software or hardware) by checking limitations and making them more secure.
Black Hats: They use their extraordinary computing skills for illegal or malicious purposes.
Suicide Hackers: Suicide hackers are those who hack for some purpose and even don’t bother to suffer long-term jail due to their activities. They can be bad as well as good.
Script Kiddies: Script Kiddies are unskilled hackers who compromise systems by running scripts, tools, and software developed by real hackers. They usually focus on the quantity of attacks rather than the quality of the attacks that they initiate.
Cyber Terrorist: They’re Individuals with a wide range of skills, motivated by religious or political beliefs to create fear of large-scale disruption of computer networks.
State Sponsored Hackers: State sponsored hackers are individuals employed by the government to penetrate and gain top-secret information and to damage information systems of other governments.
Hacktivist: Hacktivism is when hackers break into government or corporate computer systems as an act of protest. Hacktivists use hacking to increase awareness of their social or political agendas, as well as themselves, in both the online and offline arenas. Common hacktivist targets include government agencies, multinational corporations, or any other entity that they perceive as a threat. It remains a fact, however, that gaining unauthorized access is a crime, irrespective of their intentions.
I’m an Entrepreneur, Freelance Security Consultant, Bug Hunter having years of experience with a deep interest in InfoSec Industry. I love to speak and write about web and mobile application pen-testing, bug bounty. You can reach me at