Types of hacking

Types of hacking



we can classify hacking into different categories, based on what is being hacked. Here is a set of example

  • website Hacking – Hacking a website means taking unauthorized control over a web server and its associated software such as database and other interfaces
  • Network Hacking – Hacking a network means gathering information about a network by using tools like telnet, NS lookup, ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.

  • Email Hacking – It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.
  • Ethical Hacking – Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.
  • Password Hacking – This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • Computer Hacking – This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.

Advantages of hacking


    Hacking is quite useful in the following scenarios-

  •     To recover lost information, especially in case you lost your password.
  •     To perform penetration testing to strengthen computer and network security.
  •     To put adequate preventative measures in place to prevent security breaches.
  •     To have a computer system that prevent malicious hackers from gaining access.

    Disadvantages of Hacking


  •     Hacking is quite dangerous if it is done with harmful intent. it can cause –
  •     Massive security breach.
  •     Unauthorized system access on private information.
  •     privacy violation.
  •     Hampering system operation.
  •     Denial of service attacks.
  •     Malicious attack on the system.

Purpose of Hacking


  •     Just for fun
  •     Show off
  •     Steal important information
  •     Damaging the system
  •     Hampering privacy
  •     Money extortion
  •     System security testing
  •     To break policy compliance.



No comments: