Hello everyone welcome to coding statics in these blog or article we are going to understand that what is hacking and how we can learn it free of cost so if you talk about us then we provide you the best documentations on the basis of various programming language and the trending technologies and the solutions on each problems you faced with your system so without further delay lets start to our blog
Before we talk about the courses or free resources for hacking we must know that what is hacking that's why lets get answer of these question
What is hacking ?
Hacking is the act of compromising digital devices and networks through the unauthorized access to an account or computer system
For example :
if there is a thief in your home then what should he do the thief will find out the weak points of your home buy which he used and enter in your house so in these condition all of the weak points are known by the thief and he can easily done stealing in your home so the same condition is happen with your system in which the weak points of your system are known by hacker and by using these weak points he can easily access your data without your permission that means your system is hacked
I hope now you understand that what is hacking now lets understand that how hacking will done so there are some types which are used by the hackers to hack your computer or system these are follows :
1] DATA Breach
it is the way in which system was hacked by hacker of data is stolen by the hacker without the authorization of user or administration
in these way hacker hack the debit or credit card information address or names , numbers or many more in last some months we found these type of hacking with various big MNC's like Facebook, Twitter and dominos
in dominos indian data was leaked of almost 180 orders in which the data was related to the credit or debit card or online payment related data of dominos customer and these data was now available on the various online platforms
According to the IBM, the average cost of these type of data has now reached over the $4 million and the Mimecast estimates that the average ransomware demands levied against US companies is well over $6 million the world record for the largest payout of these is year is made by insurance companies now stand at $40 million
2] Social Engineering
inside the social engineering the phishing attacks are done and these attacks are very harmful phishing attacks are those attacks in which the practice of sending fraudulent communications that appears to come from a reputable sources
For example :
We get some calls and what's app messages and they say to us that we got lottery for that we want to do some KYC process or they will say these is call from bank and we want to do the SMS verifications for that they need the OTP password from us
OR another way of phishing is the downloading or opening the unsecure websites or application these unsecure applications contain the RAT ( Remote Access Trojan ) and these RAT will send our data to the hackers the whole process means we are providing our data to the hackers for hacking our device these is known as phishing
3] Man in the middle ( MITM )
In these man in the middle attack the hackers takes the middle position of user and the system that means the attackers or hackers interrupt an existing conversation or a data transfer after inserting themselves in the middle of the transfer the attackers pretend to be both legitimate participants these enables the attackers to intercept the information and the data from either party while also sending the malicious links or other information to the both legitimate participants in a way that might not be detected until it is too late
For example :
we are using the http ( hypertext transfer protocols ) protocol and due to these unsecure protocol our system is easily comes in trouble due to hackers or attackers
so the best way to prevent our system from these type of attacks is the use of https ( hypertext transfer protocols secure ) protocols and the best VPN (virtual private networks)to secure our system
Various Types of Hackers ?
In these world there are lot of hackers and these hackers do some activities some of these activities are good and required by market but some of the activities are malicious that means harmful for our system as well as our data so on the basis of their activities we differentiate the hackers into the three types
1] Black Hat hackers
Actually Black hat hacking is the global problem these type of hackers hack the data without permission of the organizations and sell these data to others these hacking is illegal due to these it comes under criminal activity
2] White Hat Hackers
White hat hackers are not illegal because they take permission of the organizations and sign the contract with them and after that they hack the data of that organization to tell about the vulnerabilities or bugs in their organizations and help them to fix or to solve those bugs these are the white hat hackers and these hacking which done by white hat hackers is known as ethical hacking and these hackers also called ethical hackers
3] Grey Hat Hackers
White hat hackers are those hackers who hack websites and the the data for only fun purpose these hackers are also we called as beginner level hackers but to do the hacking as a grey hat hackers is also not recommended so learn hacking or we can say cyber security as a ethical hacker (white hat hacker)
To know more about the cyber security just subscribe to our you tube channel and follow our web documentations
So that's all about the hacking i hope these article gives you some informational knowledge thanks for supporting
Thank you !!!
--SWARAJ DUDHE
Also check :
Free resources to learn Hacking CLICK HERE
Machine learning project 1 CLICK HERE
join our You Tube channel CLICK HERE
0 Comments