The Basics — Ethical Hacking as a Beginner [01]

Bhavyansh @ DiversePixel
2 min readApr 18, 2024

--

Hello World, I come from Web Development and this post marks my start of learning about Ethical Hacking and Cyber Security.

Understanding Ethical Hacking

  • Authorized Intrusion: Ethical hackers are “good” hackers. They use the same skills and tools as malicious hackers but operate with the organization’s permission to find weaknesses.
  • Proactive Defense: The goal is to identify vulnerabilities before criminal hackers exploit them. This allows organizations to patch security holes and strengthen their defenses.

How Ethical Hacking Fits in Cybersecurity

  • Vulnerability Assessment: It’s a core component of risk assessment and management, helping organizations understand what systems are most likely to be targeted and the potential impact.
  • Penetration Testing: This broader cybersecurity practice often includes ethical hacking to simulate real-world attacks, helping to improve incident response.
  • Staff Training: Ethical hacking results can be used to educate employees on social engineering tactics and other hacking methods, increasing cyber awareness.
  • Regulation Compliance: Many regulations require regular vulnerability assessments and penetration testing. Ethical hackers help organizations meet these requirements.
  • Softwares that should undergo security testing: Web applications, VPSs, Operating Systems, Mobile Applications, Cloud based applications. Basically every piece of software that can use internet.

Things to Note:

  • It’s Not Foolproof: Ethical hacking is an ongoing process. Even with the best ethical hackers, vulnerabilities can emerge as technology and attack methods evolve.
  • Ethics Matter: Ethical hackers must stay within strict legal and contractual boundaries, and their findings are always confidential. Organizations seeking ethical hacking need to find reputable practitioners or companies.

The first attack I learned about is Phishing, here are my learnings:

  • Phishing is a form of cybercrime where attackers trick victims into doing something harmful, usually through emails, text messages, or fake websites.
  • Goal: The main objectives are:
  • Stealing Sensitive Information: Login credentials (usernames/passwords), credit card numbers, Social Security numbers, etc.
  • Installing Malware: Trick you into downloading a virus, ransomware, or other malicious software.
  • Impersonation: Use your information to take over accounts or commit further fraud in your name.

Stay Protected!

--

--

Bhavyansh @ DiversePixel
Bhavyansh @ DiversePixel

Written by Bhavyansh @ DiversePixel

Hey I write about Tech. Join me as I share my tech learnings and insights. 🚀

No responses yet