What is ethical hacking and what does it consist of?

What is ethical hacking and what does it consist of?

What is ethical hacking and what does it consist of?

The world's information and technology news is usually full of news about discoveries and exploitation of vulnerabilities in infrastructures, equipment, systems and programs. Also, from computer attacks, security failures and even cyberwar events between countries, and their public and private infrastructures. All this narrative tends to keep fashionable or alive, to the hacker culture. That is, everything related to the Hacking Movement and Hackers. But above all, to that related to the "Ethical Hacking".

And because? Because, this area of ​​information technology is the one that encompasses and seeks, through the most professional IT experts, detect, prevent, mitigate and resolve any computer attack before or after its occurrence. For this reason, today we will explore a little about this interesting IT area of ​​the ethical hacking.

Android security

And as usual, before delving into this present publication on a point more related to the hacker world, more specifically about the ethical hacking, we will leave for those interested the links to some of our previous related posts with the same. So that they can do it easily, in case they want to increase or reinforce their knowledge about it, at the end of reading this publication:

“There are many users who wonder how to protect their mobile from hackers and theft, two different concepts that are ultimately related. And here we will show you many useful and effective measures.” How to protect my mobile from hackers and theft

Pegasus
Related article:
How to know if my mobile is infected by Pegasus

All about ethical hacking

All about ethical hacking

Origin of hacking and hackers

French Revolution

As is logical and reasonable, in some existing literature it is taken as the starting point of the origin of technological hacking or of modern hacking movement, at the time of the industrial and technological boom of the 19th century.

Since, for those years, the current and progressive degree of the existing industrialization and technology began to threaten the delicate existing balance. The balance between the owners of the wealth produced and the occupants of the jobs, who were the ones who produced it.

More precisely, moments of the French Revolution, in which punched cards began to be used. That they were the closest thing to software programs, in some devices or machinery, such as the so-called «machine»Jacquard loom«.

first computer attack

first computer attack

That is, the Perforated cards were used to automate said loom. All this, through a system similar to a kind of code created, using the hole readings as binary numbers “one” (1) and “zero” (0), such as, in modern computers.

Thus, encoding and storing the textile patterns complex on punch cards. And consequently minimizing and dispensing with the great skills of expert weavers to produce luxury cloth. Namely, reduced the number of job vacancies for that sector.

This resulted in, one of the first known computer attacks, so to call it. Given, by the angry weavers (malicious hackers) against the Jacquard looms (textile machines or computers). By launching wooden shoes on them, with the aim of blocking their mechanisms and damaging them.

What is usually taken as the equivalent of, one of the first denial of service attack or a computer sabotage, to computerized equipment in workplaces.

hacker news

hacker news

Origin of the Hacking Movement

Already in our modern times, during the 20th and 21th centuries, modern hackers tend to be more specifically associated with Information and Communication Technologies (ICT).

Since, with these they usually carry out their activities, spread their knowledge and ideas, and disseminate their actions. Thus replacing physical acts, or propaganda by means of paper and pencil, or traditional means of communication (printed press, radio and television).

Consequently, now the modern hackers are more directly related to use of the Internet through computers, mobiles, tablets, or other equipment. And mainly, through the use of free software and open source programs.

Relationship with the Free Software Movement

This more than anything, because the origin of the term “Hacker” is usually located around second half of the 20th century. And it tends to associate itself, with the clubs and laboratories of the Massachusetts Institute of Technology (Massachusetts Institute of Technology, in English, or simply MIT).

As, its workers and members were the forerunners in coining the hacker culture. These, at the end of the 50s, assigned that name (hacker) to the members of the group who were in charge of troubleshoot technical issues. Many of which were resolved through a philosophy of employment of free knowledge and tools, which they shared with each other and with others.

For this reason, it is often associated hacker movement al Free Software Movement (SL) and Open Source (OC). Since, the second is born from the first due to the need to have knowledge and alternative technologies of their own, safe and reliable to achieve their objectives.

What is Hacking and Computer Hackers?

What is Hacking and Computer Hackers?

Word origin hacker

It is said that the origin of word "Hacker", comes from the word "hack", in English, which means "to hack or cut" plus the suffix "er" which is related to “agent or person who performs an action”. This makes that word is directly related to trees. Therefore, in the past, saying that a person was a hacker, referred to a person in charge of executing said work, that is, who worked as a lumberjack.

But, over time this word was related to the computing area because, when the technicians had to fix some device, frequently They used brute force. And by means of a sharp blow on the side of computers, and other similar equipment.

And so, at first it can be said that the word "hacking" it is associated with solve everyday problems in innovative or different ways, that is, in a non-traditional or conventional way.

However, when it comes to the field of Informatics and Computing, it can be expressed that the word "hacking" refers directly to the search and exploitation of security vulnerabilities in technological infrastructures (networks, equipment, systems and programs).

computer hackers

Consequently, a Hacker in computer terms can be defined as, ora person who isoften use and master computer technologies in an advanced or extraordinary way. In order to do so, access sources of knowledge and information platforms (social, political, economic, cultural and technological) in order to achieve changes or demonstrate failure.

Hence, a computer hacker always walk in the permanent search for technological knowledge, in everything related to computer systems. And also, its security mechanisms, their vulnerabilities, how to take advantage of these vulnerabilities for various purposes.

What types of computer hackers are there?

What types of computer hackers are there?

Extensive definitions and explanations of this topic are often found on the Internet. However, a concise way of explaining the known types of computer hackers is:

White Hat Hackers

Are those computer hackers dedicated to fixing software vulnerabilities, definition of methodologies, security measures and defense of systems through different tools. That is to say, they are those people who are dedicated to security in applications, operating systems and protection of sensitive data, thus guaranteeing the confidentiality of user information.

Therefore, they are also known as “Ethical Hackers” and “Ptesters”.

Hackers of "Black Hat" (Black Hat)

Are those computer hackers dedicated to obtaining and exploiting vulnerabilities in information systems, databases, computer networks, operating systems, certain software products, among other purposes. To break their security and achieve various purposes, which are usually for their own benefit or for criminal groups of hackers.

Therefore, they are also known as "Unethical Hackers" and "Crackers".

Gray Hat Hackers

Are those computer hackers who are usually between the 2 sides, since they are usually dedicated both to obtaining and exploiting vulnerabilities and to the defense and protection of systems. And other times, they tend to carry out operations that are often in conflict from a moral point of view.

Such as, perform hacks to groups they are ideologically opposed to or run hacktivist cyber protests that may cause certain direct or collateral damage to third parties.

What is Dark Web
Related article:
What are the Dark Web and the Deep Web

What is Ethical Hacking and what does it consist of?

What is Ethical Hacking and what does it consist of?

Meaning

At this point, understanding well the Origin and meaning of Hacking and Hackers, it only remains to understand and master what is the "Ethical Hacking" and what it consists of.

In simple terms, this IT domain can be defined as follows:

El Ethical Hacking It is the field of action that defines the work of those professionals who dedicate themselves and/or are hired to hack a computer system. In order to identify and repair possible vulnerabilities found, which effectively prevents exploitation by "Malicious hackers" o "crackers".

This means that said IT field consists of the use of specialized IT professional staff in carrying out penetration tests of computer systems and software. And always, with the aim of evaluating, strengthening and improving the security of the evaluated infrastructures.

pen testers

And these IT professionals are usually called "pentesters". Therefore, its position and functions can be described as follows:

A Pentester is a professional in the area of ​​computer science, whose job is to follow several specific processes or steps that guarantee a good examination or computer analysis. In such a way, to be able to carry out all possible inquiries about failures or vulnerabilities in an analyzed computer system. Therefore, it is often called Cyber ​​Security Auditor.

In consecuense, Pentesting really is a form of Hacking, only this practice is totally legal. Since, it has the consent of the owners of the equipment to be tested, in addition to having the intention of causing real damage to correct it.

Tools

There are many tools to execute tasks of ethical hacking, in other words, hacking tools. In addition to other similar software tools related to the Informatic security, therefore, a first look at knowing them can be done through the following links:

Phishing
Related article:
What is phishing and how to avoid being scammed?

Summary of the article in Mobile Forum

Summary

In summary, the “ethical hacking” is one of many branches of computer technology, which are not only usually very exciting, but very important. Since those who work there, that is, the ethical hackers (computer hackers and pentesters) perform the admirable and vital work of, protect governments and companies.

And always, by legal and authorized analysis of its infrastructures, equipment, systems and programs to strengthen them. Reducing and thus avoiding possible attacks from so-called hackers, that is, of the malicious hackers or crackers.

In addition, we hope that this publication allows many to understand in its proper dimension the concept of the word "Hacker" and "Cracker", and many more related ones. Among other relevant definitions, such as the types of Hackers, and the tools they usually use to work. And I came, if necessary, to “awaken that hacker that everyone carries inside”, hoping to do great things, mainly for the good of others.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Actualidad Blog
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.