Skip to main content

Posts

Showing posts with the label Vulnerability Assessment

Phase of Hacking | Excellence Hacking

What is Hacking in simple term ? Hacking is a term that refers to the practice of identifying vulnerabilities in computer systems and exploiting them for various purposes. Hacking can be performed for both ethical and unethical reasons, and the process can be divided into several distinct phases. In this blog, we will explore the different phases of hacking and what they entail   Phases of Hacking 1. Reconnaissance       Reconnaissance: The first phase of hacking is reconnaissance, which involves gathering information about the target system or network. This can include conducting research on the target's employees, systems, and other relevant information. Hackers may use search engines, social media, and other tools to gather as much information as possible about the target. 2. Scanning       Scanning: The second phase of hacking is scanning, which involves using various tools to identify vulnerabilities in the target system or network. These ...

Popular posts from this blog

What is Hacking

"Hacking" word is really becoming popular day by day. As technology is growing this thing is also growing...'     In the common way people understand from hacking is ; Access someone data, stolen the information from someone devices, mobile or computer & one more aspect is : Crash someone system with his viruses, jam someone network & other this type of activity.     A security hacker is someone who explores method or way for breaching defenses and exploiting the weakness in a computer system or network . You can also say that Hacking refers to activities to compromise digital device, such as computer and smartphone and lot of other gadgets. Now a day there are lot of way to access some of data, as bind the virus in any multimedia file, social engineering and  by creating clone website.      According to Wikipedia Hacker Culture is an idea derived from a community of enthusiast programmer and system designers in the 1960s around the M...

My Hacker's Intro

  Hello Gys....!!!!!!!! It's me Warish Kumar. I am doing Master in Computer Science from MU, Rajkot (Gujarat). Today I have decided to start blogging related to cyber sector as Ethical Hacking, Cyber Security, IT Sector and many more related to Cyber World.      So today I would like to introduce to my expert of IT World. First of all Mr. Raushan Kumar who one really a different personality. Even I have mostly inspire to him for learning way in IT sector. He is little angry person but internally good, As he is very kind from heart, his helping nature is really inspire lot of people. His dream makes him unique. About his dream we will discuss late.     Now, Second one is Mr. Bharat . He is outstanding personality in cyber world. I meet him at JETKING SouthEx Delhi for first time. When I went to learn Hardware Networking & Ethical Hacking. But in starting week he still very clam & behave like he knows nothing. After a week when we start to talk with...

Hacker Vs Ethical Hacker

 The word "Hacker" is usually used with negative connotations. But a Hacker is simply someone who has good knowledge & technological expertise to understand and if needed tamper with software or other electronic system in general way. Sometime you can say that most hackers may have ability to break into computer system with malicious intention, with same skills they intend to use for the benefit of their parent companies or the common people.           When we are considering the current trend about Hackers. Then we can say that If any one access or temper another data without the owner's permission are known as Hacking. Which is also said to be "Black Hat Hacker". If the hacker access or temper another data with owner's permission that one is known as Ethical Hacker or "White Hat Hacker". These are the real meaning of Hackers in modern age.. Its not over here, just imagine when a Hacker get permit to access someone's data, what he can do ....