Skip to main content

What is Ethical Hacking? Who is Ethical Hacker?

We all heard of Hacking and Hackers in news. We think that Hacking is a bad thing and Hacker is a bad person. But you're not completely true. Hacking is not bad thing but when anyone Hack for a bad thing, then it's not good.

Well In this Post, we're going to tell you all about Ethical Hacking. So let's Begin...

What is an Ethical Hacker?

An Ethical Hacker is a person who Have in a system or network legally, ethically and with a proper permission. Ethical Hacker is defined as a person who works for a particular organisation. An Ethical Hacker hacks into a system or a network to check out it's vulnerabilities and security problems. He also checks it's security's penetration power.

Ethical Hacker is also known as “White hat Hacker”.

What is Ethical Hacking?

Apart from testing works, ethical hackers are associated with other responsibilities. The main idea is to replicate a malicious hacker at work and instead of exploiting the vulnerabilities for malicious purposes, look out the ways to shore up the system’s defenses. An ethical hacker might uses some of these strategies to penetrate a system :
  • Scanning ports and looking vulnerabilities : The vulnerabilities with each of the ports can be studied and fixed.
  • An ethical hacker tests patch installations and make sure that they can't be exploited.
  • The ethical hacker may engage in social engineering concepts like dumpster diving—rummaging through trash bins for passwords, charts, sticky notes, or anything with crucial information that can be used to generate an attack. 
  • Sniffing networks, bypassing and cracking wireless encryption, and hijacking web servers and web applications but in a legal way.
  • Ethical hackers also handle issues related to laptop theft and employee fraud.
If you found this Post Helpful then please share this Post with your friends and followers on social media. Queries are welcomed in comment section.

Thank you.

Follow me on Twitter.


  1. Share your views related to Ethical Hacking here.

  2. Yes thanks for all the information, some information of types of attacks and how does a ethical hacker prevent it would be helpful for people looking out for more info.

    Thanks for this great knowledge. We are expecting some more articles related to computer hacking.


Post a Comment

Share your views, queries related to the Article. We hate spammers. Your comments will be moderated manually by the Admin or Moderators. Your comment will appear on our blog after moderation. Spammers will never entertained here. All Spam Comments will be deleted after moderation.

Popular posts from this blog

How do you make money by shortening links through

Money values a lot to us. We can't think a life without money. We all need money for living our life that's why everyone loves money a lot.

The day's gone when peoples can only earn money offline only. But Now-a-days there are a lot of ways to earn a good amount of money online.

If you're good at writing, then you can earn money by Blogging. But Today, I am not going to talk Making money through Blogging. But today, I am going to tell a way, that needs no skill and investment. Anyone can earn through it.

The way is through shortening the links...

I'm serious, Yes you can...

Hi Friends,
Today, I will going to tell you, ‘How to earn money by shortening links’ through Let's get started...

What is is a link shortening tool developed by an European company. 
When you shorten a link through this tool and peoples click on these shorten links then you'll get income from it.
It's so simple! 
As already told you there is no skill needed to e…

Technical Facts 2 : Top 10 Facts related to Technology

In this article, I am going to tell you Top 10 Facts related to Technology. Don't forget to follow me on Twitter. Let's get started...

Now a days, we are using the pen drives having storage of 32GB and 128GB. But the First Harddisk named IBM 1311 have size of about a Washing Machine and have storage only of 5 MB. So huge!!!Normally, humans blink their eyes about 20 times but when they are using computer, they only blink for 7 times.The Windows we all use in our PCs is a project of Microsoft. In the beginning of this project this was named as “Interface Manager”, later on it was changed to “Windows”.In a month, an average of 6000 computer viruses are developed.The USB drive which completely damage a computer system is known as USB Killer.The first 1 GB hard drive was announced by IBM in 1980 which costs about 2 crore rupees.The 12 Engineers group who development first computer of IBM named as "The Dirty Dozens".The first microprocessor which was designed by Intel was …