1. What is a Computer System?

Before we learn how to hack, we need to understand what we’re hacking into.

A computer system includes:

  • Hardware (like CPU, memory, and hard drive)
  • Software (like Windows, Linux, browsers, etc.)
  • Network (how computers talk to each other using cables, Wi-Fi, etc.)

2. What is a Network?

A network is a group of computers connected together so they can share files, data, or even the internet.

Types of Networks:

  • LAN (Local Area Network) – Small, like your home or office.
  • WAN (Wide Area Network) – Big, like the internet.

3. What is a Vulnerability?

A vulnerability is like a weak point or a hole in a system. Hackers look for these to break in.

Example:

  • A website that doesn’t ask for a password might be vulnerable.
  • Old software not updated can have bugs hackers can use.

4. What is an Exploit?

An exploit is a special trick or code that takes advantage of a vulnerability.

Example: If a house has an open window (vulnerability), then using that window to sneak in is the exploit.

5. What is an IP Address?

An IP address is like a phone number for your device. It helps computers find each other on the internet.

Example: 192.168.1.1 (your home router might have this IP)

There are 2 types:

  • IPv4: 32-bit, like 192.168.1.1
  • IPv6: Newer, longer addresses like 2001:0db8:85a3::8a2e:0370:7334

6. What is a Port?

Think of your computer as a big office building. Ports are like doors to different rooms. Each port number represents a different service:

  • Port 80 – Web (HTTP)
  • Port 443 – Secure Web (HTTPS)
  • Port 21 – File Transfer (FTP)
  • Port 22 – Secure Shell (SSH)

Hackers scan ports to see which doors are open.

7. What is a Firewall?

A firewall is like a security guard. It checks who’s trying to come in or go out of your computer network.

If a hacker tries to enter your system, a good firewall can block them.

8. What is an Operating System?

It’s the main software that runs everything on your computer – like:

  • Windows
  • Linux
  • macOS

Many ethical hackers love Linux (especially Kali Linux) because it has powerful built-in hacking tools.

9. What is Encryption?

Encryption means hiding your data so no one else can read it unless they have the correct key.

Example: Your messages on WhatsApp are encrypted. Even WhatsApp can’t read them.

10. Common Tools Used in Hacking

Here are some tools you’ll often hear about:

  • Nmap – Scans networks and finds open ports.
  • Wireshark – Captures network traffic to see what’s happening.
  • Metasploit – A powerful framework to launch attacks.
  • Burp Suite – Helps in testing websites for security issues.

Quick Recap:

TermSimple Meaning
VulnerabilityWeak spot in a system
ExploitTrick used to take advantage of a weakness
IP AddressDevice’s identity on the network
PortEntry point for services
FirewallSecurity guard for the network
EncryptionHiding data so only the right person can see it

What’s Next?
Now that you know the basics, you’re ready to learn about how hackers plan their attacks in the next chapter: “Phases of Ethical Hacking”.