Hacking means finding the weakness in the computer system and then taking advantage of that weakness to blackmail the owner of that computer. Hacking is done by a person through a computer, which we call a hacker and he has a lot of knowledge of computer and computer knowledge, so he is adept at stealing data from others' computers.

On hearing the name of hacking, it is known that it is a wrong act because it is illegal and a person can be punished by doing so. But hacking every time is not wrong because not all hackers are the same, some are good hackers and some are bad hackers. Who are the good and bad hackers and what do they do, let's know about it further.


Hacking has been a very big part of computing for the last several decades. It is a very broad discipline, which covers a wide range of topics. If we first find when this hacking happened, then we will know that it was first used in 1960 by MIT, and at the same time this word "Hacker" was also born and which later became very famous also.

If we talk about the process of hacking technically, then the main work that has to be done in it is to find the possible entry points in any computer network or computer system and later finally enter it. Hacking usually involves gaining unauthorized access to a computer system or computer network. Its purpose is either to harm the system or to steal the sensitive information present in the system.

Hacking is often legal as long as a hacker uses it to find the weaknesses of a computer system or computer network for testing purpose. This type of hacking is called Ethical Hacking.

A computer expert who does this hacking himself is called "Ethical Hacker". Ethical Hackers are those who always use their knowledge to gain knowledge, how systems operate, how they are designed, and sometimes to test the security strength of the system.


We can divide Hacking into different categories, for this we will see what has been hacked. Let me give you some examples to make you understand.

Website Hacking –

This type of hacking means gaining unauthorized control over a web server and its associated software such as databases and other interfaces.

Network Hacking -

This type of hacking means to get all the information on a network and for which there are many tools such as Telnet, NS lookup, Ping, Tracert, Netstat, etc. The main purpose of doing this is only to harm the network system and its operation.

Email Hacking -

This type of hacking means that the hacker gets unauthorized access to his email account without the permission of the owner. Later which he is going to use for his illigal works.

Ethical Hacking −

This type of hacking means identifying the weakness of a system or network and helping the owner to fix it. This is a safe hacking process in which all the work is done under the supervision of the owner.

Password Hacking -

This type of hacking means that in which secret passwords are recovered from the data which is stored in the computer system or transmitted by any computer system.

Computer Hacking -

This type of hacking means that in which the hacker knows the computer ID and password of any computer system, by using hacking methods, by which they get unauthorized access to any computer system. This puts the owners at risk of their data being stolen.


Basically there are three types of hackers, two of them are bad hackers who harm people by doing bad things and one hacker is good who saves us from both these bad hackers. A good hacker is called a white hat hacker, a bad hacker is called a black hat hacker and the one who comes between these two means the one who does both good and bad work is called a gray hat hacker.

1. Black Hat Hacker -

Black hat hackers are those who enter your computer without your permission and steal your personal data like corporate data, fund transactions details, ATM card details etc., which we keep in the computer which these hackers keep. They steal and take the wrong advantage of our compulsion and demand ransom from us. Black hat hackers are very bad and they harm others for their own benefit.

2. White Hat hacker -

White hat hackers are those people who do the complete opposite of black hat hacker, that is, these hackers check the security of the computer with permission, they do it only to know or to help a company. How strong is the security of their system and whether that security can be easily broken or not. We also call white hat hackers as ethical hackers.

3. Grey Hat Hacker -

Gray hat hackers are those who do not have any personal intention to play with the data of others computer or spoil their system and they do not even want money in return. But still without permission try to hack the computer of others using their skills. They do this just to learn how to do hacking, so their motive is not bad, so they are not black hat hackers and they tried to hack the computer without permission, so they are not even white hackers, so to such hackers We call it gray hat hacker.

4. Miscellaneous Hacker -

Except for the second class of hackers, they are also divided for their hacking methods. So let's know more about it.

5. Red Hat Hackers -

Red hat hackers are called those who are a mixture of both black hat and white hat hackers. They mainly target government agencies, top-secret information hubs, and all those things that are related to sensitive information to hack them.

6.Blue Hat Hackers -

Blue Hat Hackers are called those who are often freelancers and do not work for any companies but they have complete knowledge about network security, apps, software. Such hackers are used by companies to know the loopholes of their products, for this they provide beta verison of products to them and after all they help companies a lot in this work. Companies also provide them with very good money. Many companies organize many such competitions to encourage such blue hat hackers.

7. Elite Hackers -

This is a social status among the hackers community, which is available only to those selected hackers who have exceptional skill. As such, he is the most expert player in his work. These hackers have the first of all newly discovered exploits.

8. Script Kiddie -

A script kiddie is called someone who is completely non-expert in their field and they use pre-packaged automated tools that may have been written by someone else to break into someone's computer systems. They do not know anything about those tools, how they work, and that is why they go to Kiddie.

9. Neophyte -

These are the hackers who are "n00b", or "newbie" or "Green Hat Hacker". These people are often new to the field of hacking who do not know anything about hacking and its technologies.

10. Hacktivist -

A hacktivist is called a hacker whose technology is used to hack social, ideological, religious, or political messages. In this, most people use website defacement and denial-of-service attacks.


You may be surprised to hear that but it is true that some of the Ethical Hackers of India are the most famous in the whole world. Yes friends, this is right because our hackers are at the forefront of ethical hacking. So let's know about these Ethical Hackers. Such people who are raising the name of our country high.

  1. Rahul Tyagi
  2. Ankit Fadia
  3. Trishneet Arora
  4. Manan Shah
  5. Vaidehi Sachin
  6. Sahil Khan

What is ethical hacking? Is this legal or Illegal?

Ethical hacker follows some rules to hack the system which is very important such as permission has to be taken from the owner of the computer, protects the privacy of the computer so that no one else can hack, find the weakness of the computer. Tax gives all the details to its owner by making a report.

Post a Comment