Step By Step Guide To Ethical Hacking And Cyber Security.

Ethical hacking and cybersecurity course are becoming very popular day by day. These buzz words may sound very pleasant to ears, but learning ethical hacking is not everyone’s piece of cake, it’s a long process and may take months of practice and devotion. In this article, we will be looking at different aspects of ethical hacking such as how to learn ethical hacking, who are ethical hacker, what all ethical hacking jobs are available, and much more.


Why do you want to learn Ethical Hacking?

Yes, it is the right time to ask yourself that why do you want to learn about ethical hacking is it just your interest or you look forward to taking cybersecurity as a career option.

Ethical Hacking Salary? Cybersecurity Industry in India

The Ministry of Information Technology of India has a good news for you.

The cybersecurity industry in India is going through an immense growth period and may require more than a million security professionals by the end of 2022.

All thanks to cheap data prices and availability of internet even in rural areas of India.

India is ranked second when it comes to the most vulnerable nations in terms of cybercrimes.

Banglore the Silicon Valley of India is home to more than 25% certified network security professionals serving various tech giants.

Gurugram the NCR region of Delhi comes on second place with rapidly growing IT industry with almost same no of security professionals.

There are various hacker groups in india working underground.

These hacking groups usually retaliate against cyberattacks held by various other hacking groups of different countries.

Get Started With Ethical Hacking.

In order to learn and perform practicals, we need some resources

Resource Identification

The most important thing we need is a computer system to work on with an active internet connection.

The second and the last thing is an smartphone with active internet connection.

Information Resource Management

The next important step is to know how to gather information from various resources.

These information resources are as follows


Start From Basics

It is always a good option to start with basics.

  • Learn to operate Linux
  • Use StackOverflow for online help
  • Learn programming language such as python.
  • Learn to use Google Dorking
  • Understand different Networking Protocols

Learning the structure – Phases Of Hacking
Watch the video to learn About Structure Of

There are five phases of hacking as follows –

Information Gathering (Reconnaissance)

  • Information gathering about your target is the first step in ethical hacking.

  • We need to gather as much information as possible about our target.

  • Information gathering (Reconnaissance) is also known as footprinting.

  • Information Gathering is of two types as follows
Watch The Video To Know AbOut Types Of Information Gathering In Hindi

  1. Active Information Gathering.
  2. Passive Information Gathering.

This process is done by various information gathering tools available on kali linux as follows

  • Nmap
  • Dnsmap
  • Ghost Phisher
  • Wireshark
  • Recon-ng
  • Goofile
  • Nikto
  • SET

Scanning (Vulnerability Analysis)

Scanning the network, IP addresses, accounts detail available on the target computer.

Hackers try to look for any kind of information which can help him to perform attack.

A good scanning process may lead to disclosure of certain vulnerabilities and loopholes which can be used as an advantage over the target.

Famous vulnerability analysis tools are as follows

  • Lynis
  • Nmap
  • Sqlmap
  • Oscanner
  • Powerfuzzer
  • Sqlninja

Gaining Access (Exploitation)

Gaining access is the hardest part of all.

It totally depend upon the skills and techniques used by a hacker.

This process involves taking advantage of vulnerabilities and loopholes.

Vulnerabilities can be found in the target network or computer while the process of scanning.

Hacker tries to take administrative control over the system in order to do modifications.

Famous exploitation tools available on kali linux is as follows

Maintaining Access

Once a hacker gains an access to a system the next step is to maintain that access for future exploitation and attacks.

Hacker take the help of Rootkits, Trojans or Malwares in order to maintain persistence access to the system.

This is done by various methods, different exploitation tools as well as forensic tools are used.

Metasploit Framework is the most used tool for maintaining the access.
Watch The Full Video To Automatically Install Metasploit In Termux(Android)

Clearing The Track

It’s easy to understand that no hacker would like to get caught for his activity.

It’s important to clear all the records of the past activities done by hacker.

This kind of records may include data as follows

  • Sent and received emails
  • Call logs
  • Modifying registry values
  • Deleting temporary files etc.


Hacking practice done by an hacker to test or protect an individual person, Groups or organization for a good reason is know as ethical hacking or white hat hacking.

An ethical hacker is a person who looks for the security threats in a system or a network in order to protect it from malicious activity such as hacking.

Ethical hacking salary may vary from country to country but a professional ethical hacker in india can make 5 lacks to 30 lacks per annum.


One thought on “Step By Step Guide To Ethical Hacking And Cyber Security.”

Leave a Reply