Codecademy Logo

Let's Be Ethical

What Are Hackers?

Hackers are just people with a strong interest in computers, who enjoy experimenting and tinkering with them. By experimenting and tinkering, they gain a deeper knowledge of the inner workings of computers, which can be applied to cause computers to behave in unexpected or unintended ways.

Hackers Aren’t Always Malicious

Despite what stereotypes may depict, hackers are not necessarily criminal or malicious individuals. There are certainly some hackers who match the stereotype, but many hackers choose to use their skills ethically and legally.

What Are Ethical Hackers?

Ethical hackers are hackers who use their skills ethically and legally. Ethical hackers are sometimes referred to as “white-hat” hackers.

Fun Fact: The white-hat/black-hat terminology comes from the trope of color-coded hats in cowboy films for heroes and villains.

Ethical vs. Unethical Hacking

Ethical and unethical hacking use similar knowledge and skills. What distinguishes ethical and unethical hacking is how and why the skills and knowledge are used.

Bug Hunting

Bug hunting is the process of searching, identifying, and eliminating bugs within an application or service.

The Hacking Process

The hacking process is ethical hacking tactics for organizational defense.

The Hacking Process content

The hacking process consists of Footprinting, Scanning, Enumeration, System Hacking, Escalation of Privilege, Planting Backdoors, and Covering Tracks.

Footprinting

Footprinting, also known as the “Reconnaissance” phase, is passive information gathering of targets before active attack activities.

The Hacking Process Scanning

Scanning is an initial active/passive inspecting technique to gather technical information on target systems.

The Hacking Process Enumeration

Enumeration is the consolidation and gathering of more detailed information on target systems and networks.

The Hacking Process System Hacking

System hacking is the planning and execution of attacks conducted based on the information gathered in the previous steps.

The Hacking Process Escalation of Privilege

With a successful escalation of privilege, the attackers can gain access to the systems/networks of the organization.

The Hacking Process Planting Backdoors

Planting backdoors is leaving an entry point to a compromised system for easy access in further attack activities.

The Hacking Process Covering Tracks

Covering tracks is the act of removing or destroying signs of intrusion and activities performed on a system.

Learn more on Codecademy