answersLogoWhite

0

White Hat Computer Hacking

Questions concerning 'Ethical Hacking' curriculums such as that found in any of the official ethical hacking courses may be asked here.

298 Questions

What is the definition for Computer Hacking?

Hacking is the practice of illegally gaining access to a computer or network. The term hacking is also used to describe the art of opening up a piece of electronics and modifying it. Some people argue that illegal hackers should be called crackers. This opinion is not widely held. There are white hat hackers that legally test corporate security.

Many hackers justify their hacking by saying that information should be free or that they are finding holes, thus strengthen computer security by bringing these holes to the attention of system administrators. And since this is not the forum for debate I will not comment on those justifications.

What are the types of ethical hacking?

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them. For example, a bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him. Let me add this. Hacking is simply exploring a computer's designed features, and learning how to exploit or take advantage of those features. As an example. a computer is designed to load instructions into memory using clearly defined rules, outlined in an RFC that spells out how to load something into memory. A hacker (white, grey, or black) looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then 8 more bits of data, and two more bits of instruction. A hacker looks at this and wonders, what if I pass 9 bits of data, what if I pass ten bits. etc. Sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands. Maybe it can accept 9 bits, 10 bits, and just ignore the discrepencies from the RFC, but sooner or later, the computer will not know how to interpret the instructions. When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a bufffer overflow. The hacker wants to force the computer to give up, and pass control to the SYSTEM. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question. There are three levels of hackers. White Hats spend all their time trying to break the system, to prove it can ge broke, so they can get the manufacurer to address the problem and fix it. Grey hats do the same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, and they may even try to get financial gain from their knowledge or silence. Black hats want to take the knowledge of how to break a system and use it for financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code. All three are doing the same thing, trying to break the systems. The difference is what they intend to DO with the information once they discover it. Script Kiddies take the information that hackers discover, and try to use it for their own gain. They discover nothing, they just use what others have discovered, and try to copy it for their own gain.

Which cable is used to connect computer to computer?

There are many ways to transfer information between computers, iPods, or any other storage device. The way in which you do it depends largely on your own experience. knowledge, computer, and the tools available to you. Things such as Flash Drives, compact disks (CD's), Cross over cables, and File Transfer Protocols (FTP) are all tools that you can use to transfer files. This is a brief over view of the different forms of file transference.

The first way to transfer files is through USB Drives; often called jump or flash drives. They come in a variety of sizes from 124 megabytes to several gigabytes. This is a relatively simple process and does not require high levels of knowledge. Make sure your drive can hold the files you are transferring so you don't try moving a file that is too large. It wont let you do this and you will end up either buying a new drive or having to use an alternate method of transference.

The second method I listed was CD's. This is not limited to just compact disks and may include, DVD's, floppy disks, or any other form of removable media. Common CD's will tell you how much information they hold, which on average is 700 megabytes worth of information; DVD's can hold at least 4.7 megabytes. They come in formats such as CD-R. CD-RW, DVD-R, or DVD-RW. If a disk is followed by "-R" it stands for readable, and once the information is on there you can not remove it. If a disk is followed by "-RW" it means that it is readable and writable, meaning you can change the information that is written to the disk. To use this method you will need to have a CD drive that is capable of writing on these kinds of disks. Most computers bought today, if not all, that have a CD drive will be able to perform this service to you. This is relatively simple but can be time consuming.

The third method in the list is cross-over cables. These are specific hard wire cables that allow two computers to communicate and send information between one another. The cables fit into your network jack on the motherboard of your computers and requires both computers to be connected. This requires some networking skills from the user. You must be able to set up a file sharing connection with your LAN port. Windows does a good job of giving you a "Wizard" to get it set up with little difficulty for the user.

The last method is a File Transfer Protocol. This again requires for the two computers to be networked, but not directly. One computers must create a shared folder and put information in that folder to be shared on a network. You MUST be very cautious when using this method of file transference. It opens your shared information to being seen by hackers if they are "sniffing" your network. There are alternative programs that you can use to perform these operations, but they are not hack proof.

These are the multiple ways in which you can transfer files between computers. There are probably more ways than listed, but these are more common forms of sharing information. I have used all of these listed methods and know how they work. Good luck in transferring your files.

How do you stop hackers from hacking?

One of the most common ways to stop a hacker is to install a firewall onto your computer.

It is also a good idea to use complex passwords for your online accounts.

You can also refrain from providing any type of personal information over the internet.

If you know who the hacker is, you should report them.

What are the possible consequences of computer hacking?

A lot of bad things could happen. For example, the hacker could gain access to personal information like credit-card numbers, social security numbers, etc. You could also get a number of viruses that could render your computer unusable. If you really think your computer has been hacked, you should take it to a repair shop immediately.

This is very rare however, it's more likely that you just have a virus on your computer and it is extracting information from your hard-drive. A hacker is someone who actively take information from your computer and they can be taken to jail for doing so.

Can ethical hacking be justified?

Yes, it is legal to hacking ethically. It is a legal technique to evaluate a system's security to find any possible errors by employing a range of techniques. Ethical hackers operate with the owner's permission, and their actions are watched to make sure they aren't damaging the system or the data.

Who are hackers?

i know a website which is best for cyber . if you have any question visit our site

Counting down the days, hours, minutes and seconds until Cyberpunk 2077 game

Cyberpunk 2077

Counting down the days, hours, minutes and seconds until Cyberpunk 2077 game

How do you retrieve encryption password or set new password for Netgear wireless router?

Have you tried the reset button on the back?

Type your default IP into your URL hit enter type in your login and password. If you haven't already set those you will be prompted to enter a login and password-they are always generic like:-login/login, or login/password. Aquick google search of your specific type of router will give you the best results.

Why are people involved in hacking?

Personal gain, revenge, proving they can, it will be different for everyone.

You might also want to look at here:

http://en.wikipedia.org/wiki/Black_hat

http://en.wikipedia.org/wiki/White_hat

http://en.wikipedia.org/wiki/Grey_hat

Various hacking groups.

What site has hacking software to download?

You want to get yourself a copy of Linux STD. That has all the hacking tools you need. Just go on to the official Linux STD site and download it. Its free too.

What is damage from hacking?

Hacking can cause a variety of damage depending on the vulnerability.

It ranges from very low impact to complete system take over.

What do you do if your computer freezes?

It is better to run some malware scan like malwarebytes antimalware. However, cleaning Windows registry with Reginout registry optimizer is often recommended when computer freezes most of the times.

Why does the computer freezes after logging in?

There are several things that you can check that cause slow login.

1) If you're on a domain, the domain controller may not be available, or you have your DNS Settings wrong (on a domain, your first DNS setting should be the IP of your domain controller).

2) You are attempting to map to a network drive that is no longer there (check any drive mappings)

3) You may have a CD or DVD in the drive, that it is having problems reading

4) You have a startup program that is causing you problems. Try booting in safe mode and use a program like ccleaner to figure out what is automatically starting on your computer.

5) You may have a virus.

6) You may have a poorly configured network card, bad router, bad switch; try unplugging the network cable and see if it logs on any easier.

What must you know before you can be a white hat hacker?

Before you can be a white-hat hacker, you must understand and commit to the legal and ethical framework that separates authorized security testing from wrongdoing—always obtain explicit written permission and follow responsible-disclosure practices. Technically, you need strong foundations in networking (TCP/IP, DNS, routing), operating systems (especially Linux and Windows internals), and one or more programming or scripting languages (Python, Bash, PowerShell, or C) to write and modify tools or exploit proofs-of-concept.

Learn core security concepts—cryptography, authentication, access control, web and application vulnerabilities (OWASP Top 10), and common attack techniques such as SQL injection, XSS, and privilege escalation. Familiarize yourself with standard tools and platforms (e.g., Nmap, Metasploit, Burp Suite, Wireshark) and practice in safe, legal environments like CTFs, labs, and virtual testbeds. Obtain formal training or certifications (such as OSCP, CEH, or equivalent practical courses) to validate skills and best practices, and build strong reporting, documentation, and communication abilities so findings are clear, reproducible, and actionable for stakeholders. Finally, maintain continuous learning—security is dynamic—adhere to professional ethics, and never test systems without authorization.

2 examples of way in which computer and people are effected when computer are hacked?

Depends on what kind of hacker you are. There are three types of hackers: white hat, grey hat and black hat.

White hat hackers are hackers you are given permission by people to test the security of their computer systems. For example, the government or some important business might hire a hacker to see how vulnerable their computers are. The hacker is given the permission to run some tests and that is all. These hackers know when to stop and NEVER do anything criminal at all.

Black hat hackers are the hackers who are malicious and evil. They are the people who write viruses and other types of malware to deliberately enter someone's computer system illegally and steal their confidential information like bank account information. Being a black hat hacker can get you into some serious trouble if you are caught. The Computer Fraud and Abuse Act has the authority to prosecute black hat hackers and sentence them to prison. This act not only makes it a crime to attempt to hack into someone's computer without permission, but also to conspire to do so.

Grey hat hackers are a mixture of both a white and black hat hacker. Grey hats are generally good people, but they will also do bad things time to time. They are hired by people to test their computer systems, but will do malicious things to run tests like infecting the system with a virus or such. Sometimes they will deliberately leave the virus there on purpose just so they can monitor the computer even though the client hired them out of trust. Grey hat hackers can be prosecuted just like a black hat hacker.

Is it possible to hack a computer?

Yes, its called the A12C and its used by the FBI

How many people hack?

Well, Many people consider hackers to be crazy people who really try and spend all their time "hacking" people, but really hacking isn't as easy as many people think it is, this question is hard to answer but it would actually be a lot less than many would think.

Are hackers a problem where you life?

In case of the Internet, every computer is attached to each other. So the hacker need not live in your area. Your computer can be hacked from any body from any part of the world at any movement. Internet has created a small town out of the whole world.

How does hacking or cracking work?

Computer hacking can be done remotely by sending a virus, Trojan or something.

How can you know if your computer has been hacked?

You can know that if your computer has blue screens, pop ups (if you have an anti-virus it will alert you and tell you that you got a virus) it will take more than 60 seconds for your email to load, and your computer will shut down automaticly.

How do you hack someones email id and password?

If your password, or the system that stores the password isn't very secure, then it could be 'cracked' relatively easily. Secure passwords and systems could still be cracked, but it will be much harder.

In most cases, password cracking is illegal.