Ethical Hacking

By admin
July 17, 2020
3 min read

When I first became aware of hacking in the late 90’s, I pictured someone in a dark room executing commands on a DOS prompt; and I imagined them stealing someone’s secrets or money. Whatever they were doing it was always illegal. Now, I have come to understand that hacking is the most important skill of the 21st century! And the reality of the modern world seems to agree with this statement. Nations are spying on each other, cyber criminals are stealing billions of dollars, digital worms demanding ransoms are being released, adversaries are influencing each other’s elections, and combatants are taking down each other’s utilities. Hacking is changing the world. No longer is hacking only for the “bad guys”. Hacking has now become necessary for the “good guys” because defend not only companies but our entire country.

Hacking is an elite profession within the IT field. Hacking requires a vast understanding of IT concepts and technologies, and at the most foundational level Linux is a requirement. I will talk about ethical hacking in this article, and in the next article I will discuss how to install a virtual machine so you can install Kali Linux on your system without disturbing the operating system you are already on.

Ethical hacking is the practice of programmatically trespassing into a system to find it’s weaknesses in order to better secure it. Ethical hacking can be separated into two components. The first is penetration testing, which is a legal and commissioned hack to test a system and its possible vulnerabilities. The second component is working for your nation’s military. Both are growing fields.

Linux is the hacker’s choice when it comes to operating systems because Linux offers a great level of control with few methods. Unlike windows, Linux is open source which means that the source code of the operating system is available to alter in anyway you see fit; and this is important when you are trying to make a operating system behave in ways not originally intended. Well over ninety percent of the hacking tools are created for Linux and therefore the future belongs to Linux and Unix systems. Linux/Unix systems have been the choice for operating systems since the beginning of the internet. Eighty percent of mobile devices run Linux/Unix.

Look for my post tomorrow which will be on downloading Kali Linux and virtual machines.

Leave a Reply

Your email address will not be published. Required fields are marked *