Learning Ethical Hacking 2022 news at ITIL.press

Learning Ethical Hacking

Hacking is something that we often hear about, but do not really understand what it is. In this article, you will learn how to become an ethical hacker and earn money legally right from your home.

When it comes to hackers, the first thing that comes to mind is the heroes of American films breaking into CIA bases. But hackers can also act in the interests of companies, helping to find and neutralize vulnerabilities. In this article, we will talk about the difference between ethical and unethical hacking and the career of an ethical hacker.

Can hacking be ethical?

Hacking is the identification of system vulnerabilities in order to gain access to its weak points. Although the word "hacker" is now associated with cybercriminals, the idea of ​​ethical hacking dates back much earlier. In the 1960s, students at the Massachusetts Institute of Technology used the term hacking to refer to the search for ways to optimize systems and machines to work efficiently. But in the 1980s and 1990s, cybersecurity criminals also began to be called hackers.

With the growing popularity of personal computers, many important data began to be stored on digital media. Criminals saw the opportunity to steal information that could be sold or used for fraud. These digital attackers used their skills to gain access to private computers, steal data, and even blackmail. This kind of hackers are now called Black Hat Hackers (“black hats”, “black hackers”).

As a result of companies' search for adequate protection, ethical hacking — testing the security of computer systems — has become widespread. Unlike black hats, an ethical hacker (White Hat Hacker) acts by prior arrangement and documents the hacking process.

Liability for illegal hacking

However, if a company has not officially announced a vulnerability hunt, the noble search for vulnerabilities can have unexpected consequences. So, in 2017, an 18-year-old guy from Hungary discovered that on the website of a transport company, with some manipulations, you can issue a ticket at any desired price. He immediately reported the error to the transport company, and four hours later to the main Hungarian news resource. The next day, he was detained by the police for a cyberattack.

Resources for self-learning hacking techniques

In the last article on the topic, we analyzed best laptops for hacking and the skills that you need to master in order to get into technical positions in information security (IS), and what free resources will help you with this. If you want to become an ethical hacker, check out the Awesome Ethical Hacking Resources GitHub repository, which categorizes resources: books, online and offline platforms, courses, websites, youtube channels, and more.

Get to know OSINT automated tools to help you investigate security issues. To start working as a bug hunter, it is enough to learn a few basic tools:

  • Wireshark will allow you to analyze network traffic and troubleshoot the network;
  • Acunetix Web Vulnerability Scanner automates testing web applications for vulnerabilities;
  • Sqlmap is designed to detect the weaknesses of SQL injection.