SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1242
Study of Hacking and Ethical Hacking
Mrs. Kavita Ganesh Kurale
Sr. Lecturer, Dept of Computer Engineering, Sant Gajanan Maharaj Rural Polytechnic, Mahgaon.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – Hacking is the process of finding entry points
that exist in a computer system or a computer network and
finally make control on system. Ethical hackingislegal form
of hacking. Ethical hacking is performed with the target’s
permission. This paper describes what is hacking, ethical
hacking, types of hackers, advantages and disadvantagesof
hacking, purpose of hacking and process of hacking.
Key Words: Hacking, hackers, ethical hackers
1. INTRODUCTION
Hacking is the process of finding entry points that exist
in a computer system or a computer network and finally
make control on system. Hacking is nothing but
unauthorized control on a computer system or a computer
network, either to harm the systems or to steal sensitive
information available on the computer. Many organizations
has sensitive data, hackers stole their sensitivedata,damage
the system.
Hacking is process to find problems in a computer
system for testing purpose. This type of hacking is called
Ethical Hacking. A person who hack the system is called a
"Hacker". Hackers are those who has knowledge how
systems operate, how system are designed, and then they
play with these systems.
2. TYPES OF HACKING [2]
There are different types of Hacking
2.1 Website Hacking
Hacking a website means unauthorizedpersonmakecontrol
on webserver and databases of servers and other interfaces.
2.2 Network Hacking
Network hacking means information about network are
collected and he network system and its operations are
harmed.
2.3 Email Hacking:
It means hacking the password andemail loginidofanEmail
account and using it.
2.4 Ethical Hacking
Ethical hacking means finding problems in a computer or
network system for testing purpose and fixing that problem
to make a better system.
2.5 Password Hacking
Sensitive passwords are stolen by the unauthorizedpersons
to harm the computer.
2.6 Computer Hacking
This is the process of finding computer username and
password to access to a computer system.
3. TYPES OF HACKERS[3]
3.1 White Hat Hackers
White Hat hackers are also Ethical Hackers. They
doesn’t harm a system, they try to find the problems in a
computer or a network system.Theydotestingofcomputers
or networks. Ethical hacking is not illegal type of hacking
there are numerous companies that appointsethical hackers
for testing their systems.
3.2 Black Hat Hackers
Black Hat hackers also hackers those hack system and
get unauthorized access to a system and harm its operations
or steal sensitive information. Black Hat hacking is always
illegal users because they hack the system with bad
intention like stealing corporate data, violating privacy,
damaging the system, blocking network communication,etc.
3.3 Grey Hat Hackers
Grey hat hackers also black hat and white hat hackers.
They don’t have any intention but work for their fun, they
break security in a computer system or network withoutthe
permission or knowledge. Their intention is to focus on the
weakness of computer and make the attentionoftheowners
and get appreciate from the owners.
3.4 Miscellaneous Hackers [2]
Apart from the above well-known classes of hackers,
we have the following categories of hackers based on what
they hack and how they do it –
1. Red Hat Hackers
Red hat hackers are also both black hat and white hat
hackers. They are usually hacks government sites, secret
information, and sensitive information.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1243
2. Blue Hat Hackers
A blue hat hacker is used to bug-test a system prior to
system launch. They look for loopholes available in the
system and try to fill these gaps.
3. Elite Hackers
This is a social status among hackers, which is used to
describe the most skilled. Newly discovered exploits will
circulate among these hackers.
4. Script Kiddie
A script kiddie is a non-expert who breaks into computer
systems by using pre-packaged automated tools written by
others, usually with little understanding of the underlying
concept, hence the term Kiddie.
4. ADVANTAGES OF HACKING
Hacking is quite useful in the following scenarios −
1. To recover lost information when computer
password is lost,
2. Helps us to find the loopholes in the system.
3. Make system more secure by self-hackingofsystem.
4. Understand the hackers techniques
5. Prepare for hacker attack.
6. Develop the quality of system
5. DISADVANTAGES OF HACKING
Hacking is quite dangerous if it is done with harmful
intent. It can cause −
1. Corrupt the files of Computer system
2. Unauthorized access for private information.
3. System Privacy violated.
4. Hampering system operation.
5. Ethical hacker will send and/or place malicious
code, viruses, malware and other destructive and
harmful things on a computer system
6. PURPOSE OF HACKING
There could be various positive and negative intentions
behind performing hacking activities. Here is a list of some
probable reasons why people indulge in hacking activities −
1. Just for fun
2. Show-off
3. Steal important information
4. Damaging the system
5. Hampering privacy
6. Money extortion
7. System security testing
8. To break policy compliance
7. ETHICAL HACKING
You need protection from hacker. Ethical hackers
perform the hacking of the system for security tests. Ethical
hacking — additionally referred to as penetration testing or
white-hat hacking — involves the identical tools, tricks, and
techniques that hackers use, however with one major
difference. Ethical hacking is legal form of hacking. Ethical
hacking is performed with the target’s permission. The
intention of ethical hacking is to get vulnerabilities from a
hacker’s viewpoint thus systems may be higher secured. It’s
part of an overall information risk management program
that that permits for current security enhancements.Ethical
hacking can also ensure that vendors’ claims about the
security of their products are legitimate.
8. WHY WE TEND TO HACK OUR OWN SYSTEM
“To catch a felon, assume sort of a thief”.
This is often the idea for ethical hacking. You don’t
protect your systems from everything. The only protection
against everything is to unplug your laptops, computer and
lock them away nobody will bit them — not evenyou.That’s
not the most effective approach to information security.
With the increased numbers and expanding
knowledge of hackers combined withthegrowingnumberof
system vulnerabilities and other unknowns, the time can
come when all computer systems are hacked or
compromised in some way. Protecting your systems from
the dangerous guys — and not simply the generic
vulnerabilities that everybody is aware of regarding knows
about — is absolutely critical.
Hacking preys on weak security practices and
converts vulnerabilities. Firewalls, encryption, and
nonpublic networks (VPNs) can produce a false feeling of
safety. These security systems usually focus on high-level
vulnerabilities, like as viruses and traffic through a firewall,
without affecting how hackers work. Attacking your own
systems to get vulnerabilities is a step to
Making them safer. This is often the
sole evidenced methodology of greatly hardening your
systems from attack. If you don’t identify weaknesses, it’s a
matter of time before the vulnerabilities are exploited. As
hackers expand their knowledge, so should you. You must
think like them to protect your systems from them. You, as
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1244
the ethical hacker,mustknowactivitieshackersperform and
the way to prevent their efforts. You should know what to
look for and how to use that information to thwart hackers’
efforts. You don’t have to protect your systems from
everything
9. ETHICAL HACKING PROCESS
Following is the process of Ethical hacking. [4]
9.1 Reconnaissance
Reconnaissance is the step where the attacker gathers
information about a target using active or passive means.
The tools that are widely used in this process are NMAP,
Hping, Maltego, and Google Dorks.
9.2 Scanning
In this process, the attacker begins to actively probe a
target machine or network for vulnerabilities that can be
exploited. The tools used in this process are Nessus,
Nexpose, and NMAP.
Fig-1 Process of Ethical Hacking
9.3 Gaining Access
In this process, the vulnerability is located and you
attempt to exploit it in order to enter into the system. The
primary tool that is used in this process is Metasploit.
9.4 Maintaining Access
It is the process where the hacker has already gained
access into a system. After gaining access, the hackerinstalls
some backdoors in order to enter into the system when he
needs access in this owned system in future. Metasploit is
the preferred tool in this process
9.5 Clearing Tracks
This process is actually an unethical activity. It has to
do with the deletion of logs of all the activitiesthattakeplace
during the hacking process.
9.6 Reporting
Reporting is the last step of finishing the ethical hacking
process. Here the Ethical Hacker compiles a report with his
findings and the job that was done such as the toolsused,the
success rate, vulnerabilitiesfound,andtheexploitprocesses.
10. Conclusion
Hacking has both its benefits and risks.Hackersarevery
diverse. They may bankrupt a company or may protect the
data, increasing the revenues for the company. Ethical
Hackers help organizations to understand the present
hidden problems in their servers and corporate network. In
conclusion, it must be said that the ethical hacker is an
educator who seeks to enlighten not only the customer, but
also the security industry as a whole. In an effort to
accomplish this, let us welcome the Ethical Hacker into our
ranks as a partner in this quest.
REFERNCES
[1] Wikipedia
[2] Tutorialpoint.com
[3] K.Bala Chowdappa et al, / (IJCSIT) International Journal
of Computer Science and Information Technologies, Vol. 5
(3), 2014, 3389-3393
[4] Gurpreet K. Juneja,”Ethical hanking: A technique to
enhance information security”international journal of
computer applications (3297: 2007), vol. 2, Issue 12,
December 2013.

More Related Content

What's hot (20)

DOCX
Computer security and privacy
eiramespi07
 
DOCX
ethical hacking report
Akhilesh Patel
 
PDF
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh
 
PDF
Analysis of RSA Lockheed Martin Attack
Gavin Davey
 
PPT
Network Security
Raymond Jose
 
PPTX
Security threats
Qamar Farooq
 
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
Yuval Sinay, CISSP, C|CISO
 
PPTX
Cyber Threat Hunting Workshop
Digit Oktavianto
 
PPT
Network Security Threats and Solutions
Colin058
 
PPT
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
PPTX
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Luigi Delgrosso
 
PPT
Types of attacks and threads
srivijaymanickam
 
PDF
DTS Solution - Penetration Testing Services v1.0
Shah Sheikh
 
DOCX
Final report ethical hacking
samprada123
 
PPT
Hacking And Its Prevention
Dinesh O Bareja
 
PPTX
Computer Security 101
Progressive Integrations
 
PDF
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
PDF
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Lancope, Inc.
 
PPTX
Understanding advanced persistent threats (APT)
Dan Morrill
 
PPT
11 Computer Privacy
Saqib Raza
 
Computer security and privacy
eiramespi07
 
ethical hacking report
Akhilesh Patel
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh
 
Analysis of RSA Lockheed Martin Attack
Gavin Davey
 
Network Security
Raymond Jose
 
Security threats
Qamar Farooq
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Yuval Sinay, CISSP, C|CISO
 
Cyber Threat Hunting Workshop
Digit Oktavianto
 
Network Security Threats and Solutions
Colin058
 
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Luigi Delgrosso
 
Types of attacks and threads
srivijaymanickam
 
DTS Solution - Penetration Testing Services v1.0
Shah Sheikh
 
Final report ethical hacking
samprada123
 
Hacking And Its Prevention
Dinesh O Bareja
 
Computer Security 101
Progressive Integrations
 
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Lancope, Inc.
 
Understanding advanced persistent threats (APT)
Dan Morrill
 
11 Computer Privacy
Saqib Raza
 

Similar to IRJET- Study of Hacking and Ethical Hacking (20)

PDF
IRJET- An Overview of Ethical Hacking
IRJET Journal
 
PDF
Vulnerability Prevention Using Ethical Hacking.pdf
MithunJV
 
PPTX
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
 
PDF
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
 
PDF
Ethical hacking
Mohammad Affan
 
PDF
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET Journal
 
PDF
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
DOCX
Ethical hacking
Nitheesh Adithyan
 
DOCX
Ethical Hacking
Sanu Subham
 
PPTX
Introduction ethical hacking
Vishal Kumar
 
PDF
Ethical Hacking And Hacking Attacks
Aman Gupta
 
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
FerozaMirajkar1
 
PPTX
ethical hacking
samprada123
 
PPTX
Introduction to ethical hacking
HassanAhmedShaikh1
 
PPTX
Ethical Hacking
Chetanmalviya8
 
PDF
IRJET- Ethical Hacking
IRJET Journal
 
PDF
BASICS OF ETHICAL HACKING
Drm Kapoor
 
PPTX
Web security chapter#2
Ishaq Shinwari
 
PPT
Ethical Hacking
Keith Brooks
 
PPTX
Ethical Hacking
Nitheesh Adithyan
 
IRJET- An Overview of Ethical Hacking
IRJET Journal
 
Vulnerability Prevention Using Ethical Hacking.pdf
MithunJV
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
 
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
 
Ethical hacking
Mohammad Affan
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET Journal
 
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
Ethical hacking
Nitheesh Adithyan
 
Ethical Hacking
Sanu Subham
 
Introduction ethical hacking
Vishal Kumar
 
Ethical Hacking And Hacking Attacks
Aman Gupta
 
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
FerozaMirajkar1
 
ethical hacking
samprada123
 
Introduction to ethical hacking
HassanAhmedShaikh1
 
Ethical Hacking
Chetanmalviya8
 
IRJET- Ethical Hacking
IRJET Journal
 
BASICS OF ETHICAL HACKING
Drm Kapoor
 
Web security chapter#2
Ishaq Shinwari
 
Ethical Hacking
Keith Brooks
 
Ethical Hacking
Nitheesh Adithyan
 

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 

Recently uploaded (20)

PPTX
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Element 7. CHEMICAL AND BIOLOGICAL AGENT.pptx
merrandomohandas
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
Snet+Pro+Service+Software_SNET+Pro+2+Instructions.pptx
jenilsatikuvar1
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PDF
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Design Thinking basics for Engineers.pdf
CMR University
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Element 7. CHEMICAL AND BIOLOGICAL AGENT.pptx
merrandomohandas
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Snet+Pro+Service+Software_SNET+Pro+2+Instructions.pptx
jenilsatikuvar1
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 

IRJET- Study of Hacking and Ethical Hacking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1242 Study of Hacking and Ethical Hacking Mrs. Kavita Ganesh Kurale Sr. Lecturer, Dept of Computer Engineering, Sant Gajanan Maharaj Rural Polytechnic, Mahgaon. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Hacking is the process of finding entry points that exist in a computer system or a computer network and finally make control on system. Ethical hackingislegal form of hacking. Ethical hacking is performed with the target’s permission. This paper describes what is hacking, ethical hacking, types of hackers, advantages and disadvantagesof hacking, purpose of hacking and process of hacking. Key Words: Hacking, hackers, ethical hackers 1. INTRODUCTION Hacking is the process of finding entry points that exist in a computer system or a computer network and finally make control on system. Hacking is nothing but unauthorized control on a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Many organizations has sensitive data, hackers stole their sensitivedata,damage the system. Hacking is process to find problems in a computer system for testing purpose. This type of hacking is called Ethical Hacking. A person who hack the system is called a "Hacker". Hackers are those who has knowledge how systems operate, how system are designed, and then they play with these systems. 2. TYPES OF HACKING [2] There are different types of Hacking 2.1 Website Hacking Hacking a website means unauthorizedpersonmakecontrol on webserver and databases of servers and other interfaces. 2.2 Network Hacking Network hacking means information about network are collected and he network system and its operations are harmed. 2.3 Email Hacking: It means hacking the password andemail loginidofanEmail account and using it. 2.4 Ethical Hacking Ethical hacking means finding problems in a computer or network system for testing purpose and fixing that problem to make a better system. 2.5 Password Hacking Sensitive passwords are stolen by the unauthorizedpersons to harm the computer. 2.6 Computer Hacking This is the process of finding computer username and password to access to a computer system. 3. TYPES OF HACKERS[3] 3.1 White Hat Hackers White Hat hackers are also Ethical Hackers. They doesn’t harm a system, they try to find the problems in a computer or a network system.Theydotestingofcomputers or networks. Ethical hacking is not illegal type of hacking there are numerous companies that appointsethical hackers for testing their systems. 3.2 Black Hat Hackers Black Hat hackers also hackers those hack system and get unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal users because they hack the system with bad intention like stealing corporate data, violating privacy, damaging the system, blocking network communication,etc. 3.3 Grey Hat Hackers Grey hat hackers also black hat and white hat hackers. They don’t have any intention but work for their fun, they break security in a computer system or network withoutthe permission or knowledge. Their intention is to focus on the weakness of computer and make the attentionoftheowners and get appreciate from the owners. 3.4 Miscellaneous Hackers [2] Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it – 1. Red Hat Hackers Red hat hackers are also both black hat and white hat hackers. They are usually hacks government sites, secret information, and sensitive information.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1243 2. Blue Hat Hackers A blue hat hacker is used to bug-test a system prior to system launch. They look for loopholes available in the system and try to fill these gaps. 3. Elite Hackers This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. 4. Script Kiddie A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. 4. ADVANTAGES OF HACKING Hacking is quite useful in the following scenarios − 1. To recover lost information when computer password is lost, 2. Helps us to find the loopholes in the system. 3. Make system more secure by self-hackingofsystem. 4. Understand the hackers techniques 5. Prepare for hacker attack. 6. Develop the quality of system 5. DISADVANTAGES OF HACKING Hacking is quite dangerous if it is done with harmful intent. It can cause − 1. Corrupt the files of Computer system 2. Unauthorized access for private information. 3. System Privacy violated. 4. Hampering system operation. 5. Ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on a computer system 6. PURPOSE OF HACKING There could be various positive and negative intentions behind performing hacking activities. Here is a list of some probable reasons why people indulge in hacking activities − 1. Just for fun 2. Show-off 3. Steal important information 4. Damaging the system 5. Hampering privacy 6. Money extortion 7. System security testing 8. To break policy compliance 7. ETHICAL HACKING You need protection from hacker. Ethical hackers perform the hacking of the system for security tests. Ethical hacking — additionally referred to as penetration testing or white-hat hacking — involves the identical tools, tricks, and techniques that hackers use, however with one major difference. Ethical hacking is legal form of hacking. Ethical hacking is performed with the target’s permission. The intention of ethical hacking is to get vulnerabilities from a hacker’s viewpoint thus systems may be higher secured. It’s part of an overall information risk management program that that permits for current security enhancements.Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate. 8. WHY WE TEND TO HACK OUR OWN SYSTEM “To catch a felon, assume sort of a thief”. This is often the idea for ethical hacking. You don’t protect your systems from everything. The only protection against everything is to unplug your laptops, computer and lock them away nobody will bit them — not evenyou.That’s not the most effective approach to information security. With the increased numbers and expanding knowledge of hackers combined withthegrowingnumberof system vulnerabilities and other unknowns, the time can come when all computer systems are hacked or compromised in some way. Protecting your systems from the dangerous guys — and not simply the generic vulnerabilities that everybody is aware of regarding knows about — is absolutely critical. Hacking preys on weak security practices and converts vulnerabilities. Firewalls, encryption, and nonpublic networks (VPNs) can produce a false feeling of safety. These security systems usually focus on high-level vulnerabilities, like as viruses and traffic through a firewall, without affecting how hackers work. Attacking your own systems to get vulnerabilities is a step to Making them safer. This is often the sole evidenced methodology of greatly hardening your systems from attack. If you don’t identify weaknesses, it’s a matter of time before the vulnerabilities are exploited. As hackers expand their knowledge, so should you. You must think like them to protect your systems from them. You, as
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1244 the ethical hacker,mustknowactivitieshackersperform and the way to prevent their efforts. You should know what to look for and how to use that information to thwart hackers’ efforts. You don’t have to protect your systems from everything 9. ETHICAL HACKING PROCESS Following is the process of Ethical hacking. [4] 9.1 Reconnaissance Reconnaissance is the step where the attacker gathers information about a target using active or passive means. The tools that are widely used in this process are NMAP, Hping, Maltego, and Google Dorks. 9.2 Scanning In this process, the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. The tools used in this process are Nessus, Nexpose, and NMAP. Fig-1 Process of Ethical Hacking 9.3 Gaining Access In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The primary tool that is used in this process is Metasploit. 9.4 Maintaining Access It is the process where the hacker has already gained access into a system. After gaining access, the hackerinstalls some backdoors in order to enter into the system when he needs access in this owned system in future. Metasploit is the preferred tool in this process 9.5 Clearing Tracks This process is actually an unethical activity. It has to do with the deletion of logs of all the activitiesthattakeplace during the hacking process. 9.6 Reporting Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the toolsused,the success rate, vulnerabilitiesfound,andtheexploitprocesses. 10. Conclusion Hacking has both its benefits and risks.Hackersarevery diverse. They may bankrupt a company or may protect the data, increasing the revenues for the company. Ethical Hackers help organizations to understand the present hidden problems in their servers and corporate network. In conclusion, it must be said that the ethical hacker is an educator who seeks to enlighten not only the customer, but also the security industry as a whole. In an effort to accomplish this, let us welcome the Ethical Hacker into our ranks as a partner in this quest. REFERNCES [1] Wikipedia [2] Tutorialpoint.com [3] K.Bala Chowdappa et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 3389-3393 [4] Gurpreet K. Juneja,”Ethical hanking: A technique to enhance information security”international journal of computer applications (3297: 2007), vol. 2, Issue 12, December 2013.