What is Hacking? (Hacking Kya Hai)

 What is hacking?

what is hacking

It is the process of gaining unauthorized access to a computer or a group of computers. Simply put, it is the process of gaining unauthorized access or control over computer network security systems for a specific purpose, It’s called hacking.

Hackingcan be done on single systems, groups of systems, an entire LAN network, a website or social media site, or even an email account.   The hacker can alter the system or security features to accomplish a goal that is different from the original purpose of the system.


Who is the Hacker?

A hackeris called a person who is a computer expert and programmer, he can use his programming, computer networking, or other technical skills to gain unauthorized access to other’s computers or an entire network.

types of hacking


Types of Hackers – How many types of hackers are there?

Generally, there are 3 types of hackers-


 Black Hat Hacker

 White Hat Hackers

 Gray Hat Hackers


 (1) Black Hat Hackers

 Such hackers who hack a system to gain unauthorized access and steal sensitive information are called Black Hat Hackers.  They hack the system to steal money or to do their illegal work.


Such hackers find banks or other companies with weak security, and steal money or credit card information, they can also manipulate or destroy the data.  Black hat hacking is illegal.



 (2) White Hat Hackers (Ethical Hacker)

 White hat hackers are good people in the hacking world.  They also hack the system, but they only hack the system which they have permission to hack to check the security of the system.

 White hat hacking is legal.  White Hat Hackers are also known as Ethical hackers or Penetration testers.


 (3) Gray Hat Hackers

 Gray hat hackers are hybrid hackers.  A gray hat hacker does not use his skills for personal gain because he is not a black hat hacker.  Can’t even be considered a hacker.

 Grey Hat Hackers can hack any system, even if they do not have permission to check system security but they will never steal money or damage the system, they just hacking for their fun?


Apart from this, hackers are divided into the following categories on the basis of their nature.


 (1) Script Kiddies

 Such hackers who usually use code written by other developers and hackers or available tools for hacking are called Script Kiddies.  They don’t care about hacking, their primary purpose is often to impress their friends or get attention.  These are amateur hackers.


(2) Green hat

 These are also amateur hackers.  But unlike Script Kiddies, they care about hacking and try to be a full-fledged hacker.  We can also say that such hackers who are just learning to hack, come under the category of a green hat.


 (3) Blue hat

 If a script kiddie is hacking out of vengeance, he becomes a blue hat hacker.


 (4) Red Hat Hacker

 The purpose of Red Hat Hackers is the same as that of White Hat Hackers, in simple words, they also work to stop Black Hat Hacking, but their way of working is aggressive.  Instead of reporting a malicious attack, they completely believe in taking down black hat hackers.


 (5) Hacktivist

 A hacktivist is a hacker or group of hackers.  Those who think they can bring about social change, and often hack to get the attention of government and organizations.  It uses hacking to send social, religious, and political messages.  Hacktivist hackers usually hijack websites and leave messages on them.  They use technology to announce a social, ideological, religious, or political message.


 (6) Phreaker

 Such hackers who identify and exploit vulnerabilities in the telephone instead of the computer are called Phreak.



Types of hacking Technique

 Although there are many ways of hacking, the list of some common hacking techniques is given here-

Top 10 Hacking Techniques:-


 Denial of Service (DoSDDoS)

Keylogger Injection

 Brute Force

 SQL injection

 Fake WAP

 UI Redress/ClickJacking

 Cookie Theft

 DNS spoofing

 Bait & Switch



 (1) Phishing

 This is the most harmful attack used by hackers, a spoofed link is sent to it, and the spoofed link looks like the real site of a brand, in which the user is given a user name, password, credit card detail, and so on.  Filling in sensitive information is encouraged, as the spoofed links look almost like the actual site, so many users fall into this trap and provide confidential details.


(2) Denial of Service (DoSDDoS)

 Denial of Service Distributed Denial of Service or DOS attack is a way to crash a certain server.  In this, bots are used by hackers to interrupt or crash the server, the purpose of these bots is to send a lot of requests to the server or website at once, due to so many requests at once, the server receives all the requests.  Cannot process it and crashes.  The most dangerous thing about this technique is that a hacker can crash the server in a relatively short period of time.


 (3) Keylogger Injection

Keylogger is a very simple and dangerous malicious code.  It captures the keyboard keys hit by the user and also prepares a script to send the captured data.  If a hacker succeeds in obtaining the data, then your admin credentials information will be stolen, which can allow hackers to easily log into your website.


 (4) Brute Force

 Brute force attacks are used to access a website or social media account.  In this, different combinations of passwords are used until access is obtained.  If Victim’s password is very weak then hackers are successful in cracking it.


 (5) SQL injection

 This is one of the most common web hacking techniques.  SQL injection is a code injection technique, which is used to attack data-driven apps, if the security of your website’s SQL database or libraries is weak then hackers can gain access to your confidential information by cheating the system.


 (6) Fake WAP

 In this type of hacking, hackers create a Fake Wireless Access Point (WAP) in public places like Coffee Shop, Bus Stand, Market, etc., and by analyzing the internet usage of the user connected to such WAP, the user’s details (sometimes  -sometimes password) is obtained.


 (7) UI Redress/ClickJacking

 It is very similar to Technique fishing.  But in this, the hacker creates a fake user interface and tricks the user to take him to an unusual sight, as soon as someone clicks on it, he gets redirected to a harmful site.  That’s why it is also called ClickJacking Technique.


(8) Cookie Theft

 Whenever you search anything in the browser or save your username, password, and email id, then this information is saved in the form of cookies in the browser, to steal this information Hackers use Cookie Theft Hacking Technique.  Is.


 (9) DNS spoofing

 In this, old cache data is targeted, and traffic is redirected to any harmful site.


 (10) Bait & Switch

 This is a very simple technique and in this, the user gets caught very easily because in this technique advertisements of the cheap price of a product are shown, and the user clicks on it, and be a victim of any dangerous virus or malicious code. 


The objectives of hacking

 The intent of hacking is mostly criminal or malicious, such as by stealing confidential data or money embezzlement to commit some fraud or cause some financial harm to an individual, group, or reputable entity.  Due to this business disruptions are created, and false and malicious rumors are spread.  At times, hacking is also defined as a cyber or internet crime that is punishable by law.

 However, there is another side of hacking which is done on a professional level by recognized institutions and government law agencies.  This is to counter the malicious intent of hackers or to prevent any internet crime.  It is also done for the safety and protection of the citizens and society at large.

Read also:

Bitcoin kya hai or kese karide


Biggest hack in history?

The biggest hack in history happened in 2013 for a data breach against Yahoo, the company itself revealed that all yahoo customers were affected.

Which country has the most hacker?

China is considered the country with the most dangerous hackers

Leave a Reply

Your email address will not be published.