Basics

Encoding is for maintaining data usability and can be reversed by employing the same algorithm that encoded the content, i.e. no key is used.

Encryption is for maintaining data confidentiality and requires the use of a key (kept secret) in order to return to plaintext.

Also there are two major terms that brings confusion in the world of security Hashing and Obfuscation

Hashing is for validating the integrity of content by detecting all modification thereof via obvious changes to the hash output.

Obfuscation is used to prevent people from understanding the meaning of something, and is often used with computer code to help prevent successful reverse engineering and/or theft of a product’s functionality.

5 Stages of Ethical Hacking

There are mainly 5 phases in hacking. It’s a stepwise process and when followed yields a better result.

Reconnaissance

This is the first step of Hacking. It is also called as Footprinting and information gathering Phase.

This is the preparatory phase where we collect as much information as possible about the target.

We usually collect information about three groups:

There are two types of Footprinting:

Scanning and Enumeration