What is Hacking ? Ethical Hacking Legal or Illegal ?

Table of Contents

Today we will know that What is Hacking(What is Hacking in Hindi)| Ethical Hacking is Legal or Illegal? and how many types of hackers are there.

All of you must have heard about Cybercrime, if you have not heard, then I will tell. Cybercrime There is such a crime in which hackers using computers and other people’s computers are necessary data and personal Steal files and blackmail them and demand a lot of money from them. Due to cybercrime, every year many organizations whose data has been stolen, those people have to pay lakhs of crores of rupees to save their data.

This crime is increasing in the world of

Computer  and in such a situation, everyone needs to keep the important files of their company and business safe from these hackers. But here the question arises that how to protect the important files kept in computers from being stolen. If you want to know the answer to this question, then definitely read this article that What is Hacking? And is it legal or illegal 

What is Hacking (What is Hacking in Hindi)

Hacking Means to find the weakness in the computer system and then take advantage of that weakness to blackmail the owner of that computer. Hacking is done by a person through a computer which we call  hacker  and he has a lot of knowledge of computer and computer knowledge, so he specializes in stealing data from others’ computers. On hearing the name of hacking, it is known that this is a wrong act because it is illegal and a person can be punished by doing so. But hacking every time is not wrong because not all hackers are the same, some are good hackers and some are bad hackers. Who are good and bad hackers and what do they do, let’s know about it further

A computer expert who does this hacking himself is called ” Ethical Hacker“. Ethical Hackers are those who always use their knowledge to gain knowledge, how systems operate, how they are designed, and sometimes to test the security strength of the system.

Types of Hacking

We can divide Hacking into different categories, for this we will see what has been hacked. Let me give you some examples to make you understand

  • Website Hacking – This type of hacking means gaining unauthorized control over any web server  and its associated software such as databases and other interfaces.
  • Network Hacking − This type of hacking means to get all the information on a network and for which there are many tools such as Telnet, NS lookup, Ping, Tracert , Netstat, etc. The main purpose of doing this is only to harm the network system and its operation. He only gets unauthorized access to his email account. Later which he is going to use for his illegal’s work.
  • Ethical Hacking − This type of hacking means to identify the weakness of a system or network and assisting the owner in rectifying the same. This is a secure hacking process in which all work is done under the supervision of the owner.
  • Password Hacking − This type of hacking means that in which secret passwords are recovered. Goes from the data that is stored or transmitted in the computer system by any computer system.
  • Computer Hacking − This type of hacking means that in which The hacker gets to know the computer ID and password of any computer system by using hacking methods, so that they get unauthorized access to any computer system. This puts the owners at risk of having their data stolen.

How many types of hackers are there?

Basically there are three types of hackers, two of them are bad hackers who harm people by doing bad things and one hacker is good who saves us from both these bad hackers. A good hacker is called a white hat hacker, a bad hacker is called a black hat hacker and the one who comes between these two means the one who does both good and bad work is called a gray hat hacker.

1# Black Hat Hacker

2# White Hat hacker

White hat hackers There are people who do the complete opposite of black hat hacker, that is, these hackers check the security of the computer with permission, they do it only to know Or do it to help a company, how strong is the security of their system and whether that security can be easily broken or not. We also call white hat hackers as Ethical hackers.

3# Gray Hat Hacker

Grey hat hacker are those who have no personal intention to play with the data of others computer or spoil their system and in return they Don’t even need money. But still without permission try to hack the computer of others using their skills. They do this only to learn how to do hacking, so their motive is not bad, so they are not black hat hackers and they tried to hack the computer without permission, so they are not even white hackers, so to such hackers We call it gray hat hacker.

4# Miscellaneous Hacker

Except for the second class of hackers, they are also divided for their hacking methods. So let’s know more about it.

Red Hat Hackers

Red hat hackers are called those who are a mixture of both black hat and white hat hackers. They mainly target government agencies, top-secret information hubs, and everything that deals with sensitive information to hack them.

Blue Hat Hackers

Blue Hat Hackers are called those who are often freelancers and do not work for any companies but they have complete knowledge about network security, apps, software. Such hackers are used by companies to know the loopholes of their products, for this they provide beta verison of products to them and after all they help companies a lot in this work. Companies also provide them with very good money. Many companies organize many such competitions to encourage such blue hat hackers.

Elite Hackers

This is a social status among the hackers community, which is attained by only those selected hackers who have exceptional skills. In this way, he is the most expert player in his work. All newly discovered exploits are first with these hackers.

Script Kiddie

A script kiddie is one that is completely non-expert in its field  and uses pre-packaged automated tools to penetrate someone’s computer systems that can be accessed by someone else. be written by. They do not know anything about those tools, how they work, and that is why they go to Kiddie.


These are hackers who are “n00b”, or “newbie” or “Green Hat Hacker”. These people are often new to the field of hacking who do not know anything about hacking and its technologies.


A hacktivist is called a hacker whose technology is used to hack social, ideological, religious, or political messages. In this, most people use website defacement and denial-of-service attacks.

Who are some of the Best Ethical Hackers in India?

You may be surprised to hear that but it is true that some of the Ethical Hackers of India are the most famous in the whole world. Yes friends, this is correct because our hackers are at the forefront of ethical hacking. So let’s know about these Ethical Hackers. Such people who are raising the name of our country.

  • Rahul Tyagi
  • Ankit Fadia
  • Trishneet Arora
  • Manan Shah
  • Vaidehi Sachin
  • Sahil Khan

These are some famous Ethical Hackers of India, although I have not mentioned about some other hackers here because only a few can be mentioned here. But later a second article will be written about these. Do you know about the world’s biggest hacker, if not then definitely read it.

Basic Terminologies of Ethical Hacking

Here we will know about some basic terminologies related to Ethical Hacking which are used a lot in this hacking field and it is very important for all new hackers to know about it.

Basic Terminologies of Ethical Hacking

Here we will know about some basic terminologies related to Ethical Hacking which are used a lot in this hacking field and it is very important for all new hackers to know about it.

  • Adware − Adware is software that is designed to force pre-chosen ads to be displayed on the screen.
  • Attack – This is an action performed in the system to access it and extract sensitive data.
  • Backdoor  – This back door, or trap door, is a hidden entry into a computing device or software that helps bypass all security measures, such as logins and password protections.
  • Bot – A bot is a program that helps to automate an action, that work can be done repeatedly at a higher rate and without error than any human operator. It is not even possible to do through it, that too for a long time. For example, sending HTTP, FTP or Telnet in a higher rate and in a calling script, so that they object create in a higher rate.
  • Botnet − Botnet, Also called zombie army, it is called a group of computers which is done under the knowledge of the owner. Botnets are used to send spam or to carry out denial of service attacks.
  • Brute force attack – A brute force attack is automated and can be done by any The simplest method is to gain access to the system or website. It keeps trying different combinations of usernames and passwords again and again until it finds the right combination.
  • Buffer Overflow − Buffer Overflow is a type of thing. There is a flaw that occurs when more data is written into a block of memory, or buffer, in which the buffer is instructed to hold more than the allocated space.
  • Clone Phishing − Clone phishing is a modification of existing, legitimate email with a false link  by which the recipient is tricked so that he gives all his personal information.
  • Denial of service attack (DoS) – This denial of service (DoS) attack is called that when A malicious attempt is made available to a server or a network resource for a period of time, which are previously unavailable to users. Usually, in this the services that are connected to the host are temporarily interrupted or suspended.
  • DDoS – This is a Distributed Denial of Service attack.
  • Exploit Kit – This exploit kit is a software system that is designed to run in web servers, its main purpose is for client machines. Identifying software vulnerabilities and exploiting those vulnerabilities for which it uploads malicious code to the client to be executed.
  • Exploit − Exploit of a software is a piece, a chunk of data, or a sequence of commands that can compromise a computer or network system due to a bug or vulnerability.

Read More Terms in Hindi

What is Ethical Hacking? Is this Legal or Illegal?

You have known the three types of hacking and it may also have come to know that Ethical Hacking is legal Because this hacker hacks the computer by asking and the security of the system makes it better. Ethical hacker follows some rules to hack the system, which is very important like taking permission from the owner of the computer, protects the privacy of the computer so that no one else can hack, find the weakness of the computer. Tax gives all the details to its owner by making a report.

By doing all these things, Ethical hacker protects a person or a company from the eyes of bad hacker and also saves from loss. Big companies hire ethical hackers in their company to keep their important files and corporate data safe and also give them good salary.

Advantages of Ethical Hacking

So let us now know about some advantages of Ethical Hacking.

  1. With this you can recover your lost information, especially when you forget your password.
  2. With this we can perform penetration testing so that we can get the strength of any computer or network security.
  3. This allows us to take adequate preventative measures to prevent security breaches.
  4. Learning this can help us protect our computers from malicious hackers are.

Disadvantages of Ethical Hacking

So let us now know about some disadvantages of Ethical Hacking.

  • First of all, after learning Ethical Hacking, people start doing your wrong things in the greed of money.
  • With this we can get unauthorized access on someone’s system and know their private information. .
  • With this we can also commit privacy violation.
  • If used in reverse then can also harm any system operation.

What is the Purpose of Ethical Hacking?

Let’s know here what is the main purpose of Ethical Hacking and why everyone is behind it nowadays.

  1. Many people do it to show off their hacking knowledge to others.
  2. Some people do it just for fun.
  3. There are many such people Which also do it to check the security of a company.
  4. How people do it to check the security of computer systems and networks.

I hope you have understood What is Hacking(What is Hacking in Hindi) 

Please tell us what is your opinion after reading this post or if you have any doubt related to it, then you can ask by commenting below.

If you want this information related to Ethical Hacking in Hindi  to reach more people, then do not forget to share this post with your friends and relatives in social media. If you want us to provide you more information related to Hacking, then do not forget to bookmark the link of our blog.


Share This Post
Share on facebook
Share on twitter
Share on email
Share on whatsapp

Leave a Reply

Subscribe To Our Newsletter

Get updates and learn from the best

Latest Guides & Articles