What is Hacking ? 
Introduction Of Hacking





  Hacking 
   Hacking Simply Refers To "Gaining Unauthorized Access Into A System
Or We Can Also Say that main aim of Hacking is "To compromise the Security Of a
System in order
to gain Access into
it“

in India Hackers are Treated as Criminals by those who Are Not Familiar With Working Of  A Hacker They Only See One Side Of Hacker.
That's Why India have Less Hackers As Compared To Other Developing And Developed Countries.

In India
Ethical Hackers Are also Known as Information Security Expert or Cyber Security Analyst.

Types of Hackers
 1. White Hat Hacker : Hacker Who works defensively. They     
   Perform hacking and security checks  With authority. They are Known For security

                         

     

2. Black Hat Hacker : Hacker who works offensively. They believe in breaking the security without any permission or authority. They are Known as malicious hacker 

          



3. Grey Hat Hackers : Hacker who is like a coin two sided They          work for both offensive or defensive  work    Generally benefit oriented

   
  
Phase of Hacking


 Reconnaissance: In this phase. Attacker find information about Target. It can be done actively or passively. It brings us closer to that target by giving some sensitive information about target.                                                                                                                                                             
Scanning: In this phase attacker find much more information about Target. Attacker can perform port scanning or various assessments in order to get sensitive information about target.           
Gaining Access: In this phase Attacker actually performs Hack. Using the information or vulnerability and performs exploit to gain access.                                                                     
Maintaining Access: In this phase Attacker installs backdoors or Trojans in order to maintain access into the target system.                                                                                               
Covering Tracks: In this phase Attacker deletes the logs and session details in order to not be get caught.

 I hope you guys are understand this topic if you have any doubts then comment it out i wil help you.
                      DTECH SOLUTIONS