You are on page 1of 1

As the internet continues to advance, as does cyber crimes. Today, criminals (a.k.

a malicious
hackers) no longer need to leave their homes to commit crimes, they can do so easily with a
computer and an internet connection.

Ethical hacking is a term used to describe activities performed by computer and information
security personnel to attempt to bypass system security and find any weak points/loop holes
that could be exploited by malicious hackers. They then seek countermeasures to improve the
system’s defenses.

Kali Linux is the most advanced and most used penetration testing distribution, ever made. It
is one of the most popular ethical hacking operating systems out there.

What is Ethical Hacking?


Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into
system or networks to find out threats, vulnerabilities in those systems which a malicious attacker
may find and exploit causing loss of data, financial loss or other major damages. The purpose of
ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities
found during testing. Ethical hackers may use the same methods and tools used by the malicious
hackers but with the permission of the authorized person for the purpose of improving the
security and defending the systems from attacks by malicious users.

You might also like