How to do Ethical Hacking

ethical hacking

Before digging deep in Ethical Hacking lets make something clear. Everyone wants to be a Hacker, from young students to I.T professionals but they exactly don’t known the true meaning and value of a Hacker.

Hacking is generally presumed to be a really cool and criminal work. However its all about indexing the weakness of the computer system to gain access in it.

ethical hacking quote

Hacking is pure skill. It can not be attained just for fun. It’s not all about stealing things, cracking passwords or accessing someone’s system for fun if that is than you are in the wrong direction. There is a good you need up getting yourself.

Hacker is the one who is able to exploit the weakness of the system and the process of it is known as Hacking.


Like in the old west side story where the good guys used to wear White Hat and bad guys Black Hat, similarly types of hacker are divided. Let us explore the different types of Hackers :

ethical hacking black hat
ethical hacking white hat
ethical hacking grey hat
ethical hacking red hat
ethical hacking blue hat
ethical hacking green hat
ethical hacking elite hackers
ethical hacking hacktivist

So Ethical Hacking is the one which is officially called safe as you are paid to find the weakness in systems. Ethical Hacking is the only legal way in every country to become a hacker.

Doing a Certified Ethical Hacking (CEH) can help anyone to earn handsome amount of money. Therefore Certified Ethical Hacker (CEH) is one of the smartest picks for IT security professionals pursuing a career in penetration testing.

The goal of an Ethical Hacker is to breach security system which consists of

  • Confidentiality
  • Authenticity
  • Integrity
  • Availability

Ethical Hacking Explained

An ethical hacker does not disclose the weaknesses of an evaluated system to anyone except system owner or organization owner.

After the boom in the networking and software jobs, there has been a sharp rise in the field of information security.

Hacking is performed with target’s permission, the intent of it is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. For instance, when a hacker tries to hack system he won’t be able to do so as there would be no weak point in the system to target.

Types of Job For Ethical Hacker

  • System administrator
  • Ethical hacker
  • System security architect
  • Network security specialist
  • Security manager
  • Systems auditor
  • Secure Programmer
  • Encryption specialist
  • Security analyst

Source Credit @ Google 

For more interesting blogs check out this page 

Related posts

Leave a Comment