You are on page 1of 3

ETHICAL HACKING

1.) What is ethical hacking?

Ans:-

Penetration testing, also known as intrusion testing, or ethical hacking, refers to the process of
systematically attempting to break into a computer system, application, network, or other computing
resource on behalf of its owner in order to identify threats and vulnerabilities that an unintentional hacker
might exploit.

The main goal of ethical hacking is to strengthen the network's or system's security and close any holes
discovered during testing. With the authorization of an authorized body, ethical hackers utilize the same
tools and tactics used by bad hackers to enhance security and defend the system against attacks by
malicious users.

2.) What are the types of hackers?

ANS-

Differentiating based on their motives and the legality of their actions, hackers can be classified into three
primary categories:

• Black Hat Hackers: These individuals are responsible for developing malware, gaining unauthorized
entry into systems or networks, disrupting their operations, and pilfering sensitive data.

• White Hat Hackers: Also known as ethical hackers, these professionals are often employed by
companies or government entities to identify vulnerabilities. Their goal is not to harm systems but to
uncover weaknesses through penetration testing and vulnerability assessments.

• Grey Hat Hackers: Combining aspects of both white hat and black hat hackers, this group identifies
system vulnerabilities without the owner's consent. Their objective is to bring attention to weaknesses and
typically demand compensation or incentives in exchange for revealing these vulnerabilities.

In addition to the aforementioned categories, there are miscellaneous hackers distinguished by their
targets and methods:

• Hacktivists: Individuals who leverage technology to convey social, religious, or political messages.
Hacktivism commonly involves activities like website defacement or denial-of-service attacks.

• Script Kiddies: These individuals utilize automation tools created by others to infiltrate computer
systems, often with limited understanding of the underlying concepts—hence the term "kiddie."

• Elite Hackers: An informal title within hacker circles for the most skilled practitioners. Newly
discovered exploits often circulate among this group.
• Neophytes: Also referred to as green hat hackers or newbies, these individuals possess minimal
knowledge about technology and hacking procedures.

• Blue Hat Hackers: Outsiders, not associated with computer security consulting firms, who attempt to
identify vulnerabilities in systems before their official launch. Their goal is to uncover weaknesses and
address them.

• Red Hat Hackers: A blend of black hat and white hat hackers, typically employed by top security and
government agencies. They handle sensitive information and are entrusted with safeguarding it.

3.) What are the different types of hacking?

ANS-

Based on the category of being hacked, hacking is divided into different types as follows:

1. Website hacking: This type involves illicit entry into a web server, its associated software
(including databases and interfaces), and manipulating the information stored therein..
2. Network hacking: Here, data collection about a network takes place through tools like Telnet
and ping, with the malicious intent of compromising the network's integrity and functionality.
3. Email hacking: Unauthorized entry into an email account, leading to its unauthorized usage
without the owner's consent, defines this form.
4. Password hacking: This classification involves the retrieval of concealed passwords from data
stored within a computer system.
5. Computer hacking: Unauthorized access to a computer system with the aim of pilfering data,
including passwords and user IDs, utilizing various hacking methodologies, characterizes this
type.

4). What are the advantages and disadvantages of ethical hacking?

ANS- The following are the advantages and disadvantages of ethical hacking-

Advantages:

• Contributes to the battle against cyber terrorism and breaches of national security.
• Facilitates proactive measures against malicious hackers.
• Identifies vulnerabilities and resolves gaps in systems or networks.
• Prevents unauthorized access by malicious hackers.
• Ensures security for banking and financial transactions.

Disadvantages:

• There's a potential risk of misusing data for malicious hacking endeavors.


• File corruption within an organization is a plausible outcome.
• There exists the possibility of pilfering sensitive information from computer systems.
5) What is the difference between virus and worm?

ANS-

Here are the distinctions between Virus and Worm:

Virus: A form of malware that disseminates by inserting a duplicate of itself into other programs,
integrating as a component. Viruses extend across computers via shared software, documents, network
connections, file sharing, disks, or contaminated email attachments.

Worm: Comparable to viruses and resulting in similar harm. Worms self-replicate in operational forms,
devoid of the necessity for a host program or human intervention for proliferation. Sophisticated worms
employ encryption, ransomware, and wipers to inflict damage on their targets.

You might also like