{"id":14952,"date":"2023-11-22T18:00:00","date_gmt":"2023-11-22T18:00:00","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14952"},"modified":"2023-11-23T15:12:37","modified_gmt":"2023-11-23T15:12:37","slug":"a-step-by-step-beginners-guide-to-ethical-hacking","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/","title":{"rendered":"A Step-By-Step Beginners Guide to Ethical Hacking","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>Malicious hackers use an array of tools and methodologies to breach cybersecurity. These include social engineering techniques or exploiting vulnerabilities in networks, configurations, and software with cross-site scripting (XSS), SQL injection (SQLI), and other types of attacks. Ethical hacking adds hurdles in their way.<\/p>\n\n\n\n<p>Also known as white hat hackers, ethical hackers use their own sets of tools and assessment techniques to identify security vulnerabilities before malicious hackers can take advantage of them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-understanding-the-concept-of-ethical-hacking\"><span id=\"understanding-the-concept-of-ethical-hacking\"><strong>Understanding the concept of ethical hacking<\/strong><\/span><\/h2>\n\n\n\n<p>Ethical hacking is the practice of performing security assessments using the same techniques that hackers use. However, they use proper approvals and authorization from the organization you&#8217;re hacking into. The goal is to use cybercriminals\u2019 tactics, techniques, and strategies to locate potential weaknesses and reinforce an organization\u2019s protection from data and security breaches.\u00a0<\/p>\n\n\n\n<p>An ethical hacker is an information security (infosec) expert who penetrates a computer system, network, application, or other computing resource on behalf of its owners &#8212; and with their authorization. Organizations call on ethical hackers to uncover potential security vulnerabilities that malicious hackers could exploit.<\/p>\n\n\n\n<p>The purpose of ethical hacking is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure. The process entails finding and then attempting to exploit vulnerabilities to determine whether unauthorized access or other malicious activities are possible.<\/p>\n\n\n\n<h2 id=\"origin-of-ethical-hacking\" class=\"wp-block-heading\"><strong>Origin of ethical hacking<\/strong><\/h2>\n\n\n\n<p>Former IBM executive John Patrick is often credited with creating the\u00a0<em>ethical hacking\u00a0<\/em>term in the 1990s. However, the concept and its applied practice occurred much earlier.<\/p>\n\n\n\n<p>The term\u00a0<em>hacking<\/em>\u00a0first started to appear in the 1960s in connection with activities at the Massachusetts Institute of Technology. It referred to applying creative engineering techniques to &#8220;hack&#8221; machinery and make it operate more efficiently. At the time, hacking was considered to be a compliment for those with exceptional skills in computer programming.<\/p>\n\n\n\n<p>Malicious hacking became more frequent in later decades, in parallel with the commercialization of consumer-oriented computer technologies. Hackers realized\u00a0computer programming languages\u00a0could be used to manipulate telecommunications systems and complete long-distance calls for free, a practice dubbed\u00a0<em>phreaking<\/em>.<\/p>\n\n\n\n<p>The commercialization of hacking skills, known as hacking as a service (HaaS), has made cybersecurity more complex. On the positive side, cybersecurity firms and information technology (IT) security vendors have started to offer optional ethical HaaS via contract to corporate clients. However, an underground market is flourishing on the dark web, including online marketplaces for aspiring hackers, often in the pursuit of illegal activities.<\/p>\n\n\n\n<p>The coronavirus pandemic created new avenues of pursuit for cybercriminals. In &#8220;The Hidden Costs of Cybercrime,&#8221; published in July 2020 by the Center for Strategic and International Studies and security software company McAfee, monetary losses from cybercrime in 2020 are estimated to top $945 billion. <\/p>\n\n\n\n<p>In addition, the report estimated that organizations will spend $145 billion on cybersecurity services and technologies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"0-ethical-hacking-vs-hacking-whats-the-difference\"><span id=\"difference-between-ethical-hacking-and-hacking\"><strong>Difference between ethical hacking and hacking<\/strong><\/span><\/h3>\n\n\n\n<p>Hackers, who are often referred to as black-hat hackers, are those known for illegally breaking into a victim\u2019s networks. Their motives are to disrupt systems, destroy or steal data and sensitive information, and engage in malicious activities or mischief.&nbsp;<\/p>\n\n\n\n<p>Black-hat hackers usually have advanced knowledge for navigating around security protocols,&nbsp; breaking into computer networks, and writing the malware that infiltrates systems. Here are some of the differences:<\/p>\n\n\n\n<p>Ethical hackers, on the other hand, are commonly called white-hat hackers. They use many of the same skills and knowledge as black-hat hackers but with the approval of the company that hires them. These information security professionals are hired specifically to help find and secure vulnerabilities that may be susceptible to a cyber attack. <\/p>\n\n\n\n<p>Ethical hackers will regularly engage in assessing systems and networks and reporting those findings.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Ethical hackers<\/th><th>Black-hat hackers<\/th><\/tr><\/thead><tbody><tr><td>Increase security framework<\/td><td>Reduce security and steal data<\/td><\/tr><tr><td>Develop strong security and structures<\/td><td>Access accounts and data without permission<\/td><\/tr><tr><td>Develop systems like ad blockers and firewalls and regularly update and maintain security systems<\/td><td>Steal valuable data and break into restricted data areas<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 id=\"what-do-ethical-hackers-do\" class=\"wp-block-heading\"><strong>What do ethical hackers do?<\/strong><\/h2>\n\n\n\n<p>Ethical hackers can help organizations in several ways, including the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Finding vulnerabilities.\u00a0<\/strong>Ethical hackers help companies determine which of their IT security measures are effective, which need updating and which contain vulnerabilities that can be exploited. When ethical hackers finish evaluating an organization&#8217;s systems, they report back to company leaders about those vulnerable areas. These may include a lack of sufficient password encryption, insecure applications or exposed systems running unpatched software. <\/li>\n<\/ul>\n\n\n\n<p>Organizations can use the data from these tests to make informed decisions about where and how to improve their security posture to prevent\u00a0cyber attacks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Demonstrating methods used by&nbsp;<\/strong><strong>cybercriminals.&nbsp;<\/strong>These demonstrations show executives the hacking techniques that malicious actors could use to attack their systems and wreak havoc on their businesses. Companies that have in-depth knowledge of the methods the attackers use to break into their systems are better able to prevent those incursions.<\/li>\n\n\n\n<li><strong>Helping to prepare for a cyber attack.\u00a0<\/strong>Cyber attacks can cripple or destroy a business &#8212; especially a smaller business &#8212; but most companies are still unprepared for cyber attacks. Ethical hackers understand how\u00a0threat actors\u00a0operate, and they know how these bad actors will use new information and techniques to attack systems. <\/li>\n<\/ul>\n\n\n\n<p>Security professionals who work with ethical hackers are better able to prepare for future attacks because they can better react to the constantly changing nature of online threats.<\/p>\n\n\n\n<h2 id=\"how-to-become-an-ethical-hacker\" class=\"wp-block-heading\"><strong>How to become an ethical hacker<\/strong><\/h2>\n\n\n\n<p>There are no standard education criteria for an ethical hacker, so an organization can set its own requirements for that position. Those interested in pursuing a career as an ethical hacker should consider a bachelor&#8217;s or master&#8217;s degree in infosec, computer science or even mathematics as a strong foundation.<\/p>\n\n\n\n<p>Individuals not planning to attend college can consider pursuing an infosec career in the\u00a0military. Many organizations consider a military background a plus for infosec hiring, and some organizations are required to hire individuals with security clearances.<\/p>\n\n\n\n<p>Other technical subjects &#8212; including programming, scripting, networking and hardware engineering &#8212; can help those pursuing a career as ethical hackers by offering a fundamental understanding of the underlying technologies that form the systems they will be working on. Other pertinent technical skills include system administration and software development.<\/p>\n\n\n\n<h2 id=\"certifications-for-ethical-hackers\" class=\"wp-block-heading\"><strong>Certifications for Ethical Hackers<\/strong><\/h2>\n\n\n\n<p>There are several ethical hacking certifications and related IT security certifications that help ethical hackers demonstrate their subject matter expertise. Industry certifications include the following:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-certified-ethical-hacker-ceh\"><span id=\"certified-ethical-hacker-ceh\"><strong>Certified Ethical Hacker (CEH)<\/strong><\/span><\/h3>\n\n\n\n<p>This is a vendor-neutral certification from the International Council of Electronic Commerce Consultants (EC-Council), one of the leading certification bodies. This security certification, which validates how much an individual knows about network security, is best suited for a pen tester role. The certification covers more than 270 attack technologies. <\/p>\n\n\n\n<p>Prerequisites for this certification include attending official training offered by the EC-Council or its affiliates and having at least two years of infosec-related experience. The CEH Master certification encompasses two dozen hacking competitions and other challenges, with a focus on security for cloud computing and application containers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-three-programs-by-comptia\"><span id=\"three-programs-by-comptia\"><strong>Three programs by CompTIA<\/strong><\/span><\/h3>\n\n\n\n<p>Cybersecurity Analyst (<a href=\"https:\/\/www.comptia.org\/certifications\/cybersecurity-analyst\" target=\"_blank\" rel=\"noreferrer noopener\">CySA+<\/a>), Advanced Security Practitioner (<a href=\"https:\/\/www.comptia.org\/training\/by-certification\/casp\" target=\"_blank\" rel=\"noreferrer noopener\">CASP+<\/a>) and\u00a0<a href=\"https:\/\/www.comptia.org\/certifications\/pentest\" target=\"_blank\" rel=\"noreferrer noopener\">PenTest+<\/a>. CySA+ teaches students to apply behavioral analytics to improve network security. The CASP+ certification &#8220;validates advanced-level competency&#8221; in\u00a0risk management\u00a0and issues related to enterprise security operations and architecture. <\/p>\n\n\n\n<p>The PenTest+ certification is geared to IT professionals engaged in pen testing and assessing vulnerabilities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-certified-information-security-manager-cism\"><span id=\"certified-information-security-manager-cism\"><strong>Certified Information Security Manager (CISM)<\/strong><\/span><\/h3>\n\n\n\n<p>CISM is an advanced certification offered by ISACA that provides validation for individuals who have demonstrated the in-depth knowledge and experience required to develop and manage an enterprise infosec program. The certification is aimed at infosec managers, aspiring managers or IT consultants who support infosec program management. <\/p>\n\n\n\n<p>As with the CISA certification, five years of related work experience is a prerequisite.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-certified-information-systems-auditor-cisa\"><span id=\"certified-information-systems-auditor-cisa\"><strong>Certified Information Systems Auditor (CISA)<\/strong><\/span><\/h3>\n\n\n\n<p>This certification is offered by\u00a0ISACA, a nonprofit, independent association that advocates for professionals involved in infosec, assurance, risk management, and\u00a0governance. The exam certifies the knowledge and skills of security professionals. To qualify for this certification, candidates must have five years of professional work experience related to information systems auditing, control or security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-giac-security-essentials-gsec\"><span id=\"giac-security-essentials-gsec\"><strong>GIAC Security Essentials (<a href=\"https:\/\/www.giac.org\/certification\/security-essentials-gsec\" target=\"_blank\" rel=\"noreferrer noopener\">GSEC<\/a>)<\/strong><\/span><\/h3>\n\n\n\n<p>This certification created and administered by the Global Information Assurance Certification organization is geared toward security professionals who want to demonstrate they are qualified for IT systems hands-on roles concerning security tasks. Candidates must to demonstrate they understand infosec beyond simple terminology and concepts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-microsoft-technology-associate-security-fundamentals\"><span id=\"microsoft-technology-associate-security-fundamentals\"><strong>Microsoft Technology Associate Security Fundamentals<\/strong><\/span><\/h3>\n\n\n\n<p>Microsoft offered this exam as a starting point for the more comprehensive\u00a0Microsoft Certified Solutions Associate. As of June 2021, however, Microsoft discontinued those exams in favor of its new role-based exams.<\/p>\n\n\n\n<h2 id=\"ethical-hacking-techniques\" class=\"wp-block-heading\"><strong>Ethical hacking techniques<\/strong><\/h2>\n\n\n\n<p>Ethical hackers generally use the same hacking skills that malicious actors use to attack enterprises. They use a form of\u00a0reverse engineering\u00a0to imagine scenarios that could compromise business and operational data. The varied techniques and tools are part of an overall\u00a0vulnerability assessment\u00a0the ethical hacker performs on a client&#8217;s behalf.<\/p>\n\n\n\n<p>Some of these hacking techniques include the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>scanning ports to find vulnerabilities\u00a0with port scanning tools<\/strong>. These include Nmap,\u00a0Nessus, Wireshark\u00a0and others. They also look at a company&#8217;s systems, identify open ports, study the vulnerabilities of each port and recommend remedial action;<\/li>\n\n\n\n<li><strong>scrutinizing patch installation<\/strong>&nbsp;<strong>processes<\/strong>&nbsp;to be sure that the updated software doesn&#8217;t introduce new vulnerabilities that can be exploited;<\/li>\n\n\n\n<li><strong>performing network traffic analysis and sniffing<\/strong>&nbsp;by using appropriate tools;<\/li>\n\n\n\n<li><strong>attempting to evade intrusion detection systems, intrusion prevention systems,\u00a0honeypots\u00a0and\u00a0firewalls<\/strong>; and<\/li>\n\n\n\n<li><strong>testing methods to detect\u00a0Structured Query Language injection<\/strong>\u00a0to ensure malicious hackers can&#8217;t introduce security exploits that expose sensitive information contained in SQL-based\u00a0relational databases.<\/li>\n<\/ul>\n\n\n\n<p>Ethical hacking also relies on\u00a0social engineering\u00a0techniques to manipulate end users and obtain information about an organization&#8217;s computing environment. Like black hat hackers, ethical hackers rummage through postings on social media or\u00a0GitHub or engage employees in\u00a0phishing\u00a0attacks through email or texting. They can also roam through premises with a clipboard to exploit vulnerabilities in physical security. <\/p>\n\n\n\n<p>However, there are social engineering techniques that ethical hackers should not use. These include making physical threats to employees or other types of attempts to extort access or information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"key_benefits_of_ethical_hacking\"><span id=\"benefits-of-ethical-hacking\"><strong>Benefits of ethical hacking<\/strong><\/span><\/h2>\n\n\n\n<p>Learning ethical hacking involves studying the mindset and techniques of black hat hackers and testers to learn how to identify and correct vulnerabilities within networks. Ethical hacking can be applied by security professionals across industries and in a multitude of sectors. This sphere includes network defender, risk management, and quality assurance tester.\u00a0<\/p>\n\n\n\n<p>However, the most obvious benefit of learning ethical hacking is its potential to inform, improve, and defend corporate networks. The primary threat to any organization&#8217;s security is a hacker. Hence, learning, understanding, and implementing how hackers operate can help network defenders prioritize potential risks and learn how to remediate them best. <\/p>\n\n\n\n<p>Additionally, getting ethical hacking training or certifications can benefit those who are seeking a new role in the security realm. It also helps those wanting to demonstrate skills and quality to their organization.<\/p>\n\n\n\n<h2 id=\"types-of-hackers\" class=\"wp-block-heading\"><strong>Types of hackers&nbsp;<\/strong><\/h2>\n\n\n\n<p>Black-hat hackers are always the outlaws, the ones with malicious intentions. But, over time, ethical hackers have shifted into a variety of roles other than white-hat hackers.&nbsp;<\/p>\n\n\n\n<p>Some of the roles include red teams that work in an offensive capacity, blue teams that work as a defense for security services, and purple teams that do a little of both:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Red teams<\/strong>&nbsp;may pose as a cyberattacker to assess a network or system&#8217;s risk and vulnerabilities in a controlled environment. They examine potential weaknesses in security infrastructure and also physical locations and people.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Blue teams<\/strong>\u00a0are aware of the business objectives and security strategy of the organization they work for. They gather data, document the areas that need protection, conduct risk assessments, and strengthen the defenses to prevent breaches. These ethical hackers may introduce stronger password policies, limit access to the system, put monitoring tools in place. They also educate other staff members so that everyone&#8217;s on the same page.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Purple teams<\/strong>\u00a0bring red and blue teams together and encourage them to work together. This creates a strong loop of feedback and helps reach the goal of increasing the organization&#8217;s security overall.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-articles\"><span id=\"recommended-articles\"><strong>Recommended Articles <\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/what-to-do-if-your-identity-is-stolen-easy-recovery-guide\/\">What to Do If Your Identity Is Stolen: Easy Recovery Guide<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/why-is-cybersecurity-important-all-you-need-to-know\/\">Why Is Cybersecurity Important? All You Need To Know<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/clickjacking-what-is-it-how-does-it-work\/\">Clickjacking: What Is It &amp; How Does It Work?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/data-leak-what-it-is-how-to-prevent-it\/\">Data Leak: What It Is &amp; How To Prevent It<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-the-principle-of-least-privilege-all-you-need-to-know\/\">What is the Principle of Least Privilege? All You Need To Know<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/vpn-benefits-pros-cons-of-a-vpn-in-everyday-use\/\">VPN Benefits: Pros &amp; Cons of a VPN in Everyday Use<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\"><strong>References<\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.simplilearn.com\/tutorials\/cyber-security-tutorial\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Simplilearn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">TechTarget<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.coursera.org\/articles\/category\/it\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Coursera<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"Malicious hackers use an array of tools and methodologies to breach cybersecurity. These include social engineering techniques or&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":290,"featured_media":14979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[302],"tags":[],"class_list":{"0":"post-14952","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Step-By-Step Beginners Guide to Ethical Hacking - Business Yield Technology<\/title>\n<meta name=\"description\" content=\"Ethical hacking is the practice of performing security assessments using the same techniques that hackers use but with proper approval.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Step-By-Step Beginners Guide to Ethical Hacking - Business Yield Technology\" \/>\n<meta property=\"og:description\" content=\"Ethical hacking is the practice of performing security assessments using the same techniques that hackers use but with proper approval.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Jay.Arnis\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-22T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-23T15:12:37+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jimmy Anisulowo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/forlahjay\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jimmy Anisulowo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/\",\"url\":\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/\",\"name\":\"A Step-By-Step Beginners Guide to Ethical Hacking - Business Yield Technology\",\"isPartOf\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg?fit=1000%2C667&ssl=1\",\"datePublished\":\"2023-11-22T18:00:00+00:00\",\"dateModified\":\"2023-11-23T15:12:37+00:00\",\"author\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\"},\"description\":\"Ethical hacking is the practice of performing security assessments using the same techniques that hackers use but with proper approval.\",\"breadcrumb\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg?fit=1000%2C667&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg?fit=1000%2C667&ssl=1\",\"width\":1000,\"height\":667,\"caption\":\"Image by Freepik\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/businessyield.com\/tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Step-By-Step Beginners Guide to Ethical Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/businessyield.com\/tech\/#website\",\"url\":\"https:\/\/businessyield.com\/tech\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/businessyield.com\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\",\"name\":\"Jimmy Anisulowo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"caption\":\"Jimmy Anisulowo\"},\"description\":\"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.\",\"sameAs\":[\"https:\/\/www.facebook.com\/Jay.Arnis\",\"https:\/\/www.instagram.com\/forlahjay\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/forlahjay\"],\"url\":\"https:\/\/businessyield.com\/tech\/author\/jimmy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Step-By-Step Beginners Guide to Ethical Hacking - Business Yield Technology","description":"Ethical hacking is the practice of performing security assessments using the same techniques that hackers use but with proper approval.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"A Step-By-Step Beginners Guide to Ethical Hacking - Business Yield Technology","og_description":"Ethical hacking is the practice of performing security assessments using the same techniques that hackers use but with proper approval.","og_url":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/","og_site_name":"Business Yield Technology","article_author":"https:\/\/www.facebook.com\/Jay.Arnis","article_published_time":"2023-11-22T18:00:00+00:00","article_modified_time":"2023-11-23T15:12:37+00:00","og_image":[{"width":1000,"height":667,"url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg","type":"image\/jpeg"}],"author":"Jimmy Anisulowo","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/forlahjay","twitter_misc":{"Written by":"Jimmy Anisulowo","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/","url":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/","name":"A Step-By-Step Beginners Guide to Ethical Hacking - Business Yield Technology","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg?fit=1000%2C667&ssl=1","datePublished":"2023-11-22T18:00:00+00:00","dateModified":"2023-11-23T15:12:37+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff"},"description":"Ethical hacking is the practice of performing security assessments using the same techniques that hackers use but with proper approval.","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg?fit=1000%2C667&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg?fit=1000%2C667&ssl=1","width":1000,"height":667,"caption":"Image by Freepik"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/a-step-by-step-beginners-guide-to-ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"A Step-By-Step Beginners Guide to Ethical Hacking"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff","name":"Jimmy Anisulowo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","caption":"Jimmy Anisulowo"},"description":"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.","sameAs":["https:\/\/www.facebook.com\/Jay.Arnis","https:\/\/www.instagram.com\/forlahjay\/","https:\/\/x.com\/https:\/\/twitter.com\/forlahjay"],"url":"https:\/\/businessyield.com\/tech\/author\/jimmy\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-1-8.jpg?fit=1000%2C667&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=14952"}],"version-history":[{"count":1,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14952\/revisions"}],"predecessor-version":[{"id":14980,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14952\/revisions\/14980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/14979"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=14952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=14952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=14952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}