πŸŽ‰ Register in Political Instability Writing Contest & Win cash prize 1,000 INR!
What is Ethical Hacking - by Ian Gladwin Alva - CollectLo

What is Ethical Hacking

Ian Gladwin Alva - CollectLo

Ian Gladwin Alva

Content Writer

1 min read . Sep 13

Clap
Save

What is Ethical Hacking?

Ethical Hacking is the branch of cybersecurity where professionals find security-related issues in computer systems, networks, applications, and digital infrastructures to identify and fix vulnerabilities before malicious hackers can exploit them. 

What are the methods do ethical hackers use?

Ethical hackers use a variety of methods to identify and address security vulnerabilities. Common methods include:

  • Reconnaissance – Collecting info about the target system (e.g., IPs, domains).
  • Scanning – Identifying open ports and services using tools like Nmap.
  • Gaining Access – Exploiting vulnerabilities to test system entry points.
  • Maintaining Access – Simulating how attackers stay in systems unnoticed.
  • Covering Tracks – Testing how attackers hide activity to improve detection.
  • Social Engineering – Tricking users to reveal sensitive info (e.g., phishing).
  • Vulnerability Assessment – Finding and evaluating system weaknesses.
  • Wireless Testing – Checking for flaws in Wi-Fi security and configurations.
  • Web App Testing – Testing websites for issues like XSS or SQL injection.
  • Reporting – Documenting findings and suggesting security fixes.

How to become an ethical hacker?

To become an ethical hacker, you should do the course in Certified Ethical Hacker(CEH), gain hands-on experience with real-world security tools, and build strong knowledge in networking, programming and system security.

What are the benefits of becoming ethical hacker?

The benefits of ethical hacker are

  • Improves security - Finds and fixes system flaws.
  • High Demand - Needed in IT, Banks and Government.
  • Good Salary - It offers attractive pay
  • Legal use - Uses hacking skills ethically.
  • Recognition - Respected for protecting data.
  • Learning - Stay updated with new tech.
  • Social Impact - Safeguards privacy and information.
  • Global scope - Jobs worldwide with Certified Ethical Hacker(CEH).
  • Career growth- Path to senior roles.
  • Skill boost - Sharpens problem-solving.

Hierarchy of positions of Ethical Hacker:

Here is a list of hierarchy of positions of ethical hacker:

1. Entry-Level Positions

These are for individuals just starting in cybersecurity or ethical hacking.

  • Security Analyst / Information Security Analyst
  • Junior Penetration Tester
  • Cybersecurity Technician
  • SOC Analyst (Tier 1) – Monitoring and basic incident response
  • IT Security Administrator

Certifications helpful: CompTIA Security+, CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional – junior level)

2. Mid-Level Positions

Professionals with a few years of experience who handle more complex tasks.

  • Penetration Tester / Ethical Hacker
  • Red Team Operator
  • Blue Team Analyst
  • Security Consultant
  • SOC Analyst (Tier 2/3)
  • Threat Hunter
  • Vulnerability Analyst

Certifications helpful: OSCP, GPEN (GIAC Penetration Tester), CySA+, eJPT, eCPPT, etc.

3. Senior-Level Positions

Advanced professionals who lead teams, design security strategies, and perform high-level testing.

  • Senior Penetration Tester
  • Security Engineer / Senior Security Analyst
  • Red Team Lead
  • Incident Response Manager
  • Security Architect
  • Threat Intelligence Analyst

Certifications helpful: OSCE (Offensive Security Certified Expert), CISSP, GREM, GXPN

4. Managerial & Leadership Positions

These roles involve management, strategic planning, and decision-making.

  • Cybersecurity Manager
  • Security Operations Center (SOC) Manager
  • Red Team Manager
  • Information Security Manager
  • IT Risk Manager

5. Executive & C-Level Positions

High-level leadership roles responsible for company-wide security.

  • Chief Information Security Officer (CISO)
  • Chief Security Officer (CSO)
  • Director of Information Security
  • VP of Cybersecurity / Information Security

MNCs & Large Firms Using Ethical Hacking in India:

  1. IBM
  2. Accenture
  3. Deloitte
  4. EY
  5. PwC
  6. KPMG
  7. Wipro
  8. Infosys
  9. TCS
  10. HCL
  11. Tech Mahindra
  12. Capgemini
  13. Amazon
  14. CISCO

Key Government Organizations / Agencies in India:

  1. CERT‑In (Indian Computer Emergency Response Team)
  2. NCIIPC (National Critical Information Infrastructure Protection Centre)
  3. I4C (Indian Cyber Crime Coordination Centre)
  4. National Cyber Coordination Centre (NCCC)
  5. NSCS (National Cyber Security Strategy / coordination body)
  6. Cyber & Information Security (C&IS) Division, Ministry of Home Affairs
  7. NIELIT (National Institute of Electronics & Information Technology)

Notable Ethical Hackers:

  1. Anand Prakash
  2. Trishneet Arora
  3. Santosh Kumar
  4. Ankit Fadia

Case Study: 

Subject: Anand Prakash

Company: Uber

Location: India (based in Bangalore)  

Background:

In 2016, Anand Prakash, a prominent Indian ethical hacker and bug bounty hunter, discovered a critical vulnerability in Uber’s authentication system. He was participating in Uber's bug bounty program on HackerOne.

The Vulnerability:

  • Uber had an account takeover flaw in its two-factor authentication process.
  • The flaw allowed attackers to log in to any Uber user’s account, bypassing OTP (one-time password).
  • Anand exploited a rate-limiting vulnerability: the system did not block repeated login attempts.
  • Using brute force, an attacker could guess OTPs and take control of user accounts, see trip history, personal details, and even manipulate bookings.

What Anand Did:

  1. Tested in sandbox without causing real damage.
  2. Reported it to Uber through their bug bounty platform.
  3. Gave full proof-of-concept (PoC) code and explanation.

Outcome:

  • Uber patched the vulnerability within a day.
  • Anand was awarded $5,000 through the HackerOne program.
  • The flaw, if exploited maliciously, could have affected millions of users globally.