Abhishek Morkhade

Abhishek Morkhade is a certified ethical hacker who works as a bug hunter for HackerOne. He is also a bung hunter, find bugs in apps and vulnerability in sites. On social platforms help hundreds of people to make their career in cyber security and ethical hacking, having experience of a total of one to two years in data analysis and blogging.

Education
His qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple-choice questions regarding various ethical hacking techniques and tools. The code for the CEH exam is 312-50. This certification has now been made a baseline with a progression to the CEH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment.

studied and start learning for the past six years Advanced knowledge in network security. He had extensive experience in the area of network security and a working knowledge of various operating systems.

Journey
He is a grey hat hacker who changed his hat to white. Guided and train people to become secured and aware about hacking attacks and guided over ten plus blogs.

A career in cybersecurity is not for the faint of heart, it requires a person who is interested in continuous learning. He was interested in cybersecurity from the beginning but most of what I learnt over the years is self-taught. He started out with reading about various network-based attacks as they could be performed on home network itself. He read a few good books available online. Then I moved on to the material that is recommended for CEH. That introduced me to a number of tools like Nmap, Wireshark, Metasploit, and various other tools. He went on to learn further about them. Fun fact, try using a smartly crafted Metasploit payload to hack your friend’s android phones. Eventually, my interest shifted from network security to application security. Trying to learn how to hack websites I landed on OWASP and SANS website. He practiced everything I learnt on sites like root-me.org, downloading various VMs from vulnhub and participating in a lot of CTFs. Various blogs and proof of concepts available online further helped me to understand various sophisticated attacks happening all around the world.

he was aware of gamified hiring and was already an active member of Campus Commune. That is how he came to know about #HackQuest and he was all game for it as he could see his dreams coming true to work as a cybersecurity professional in prestigious organizations like HackerOne academy as a bug founder and premium member, he then thrills and motivated peoples further on social media and their blogs.

Hackerone is aimed at students who want to make a career in cybersecurity by proving their mettle at a national level hacking contest and also provides an opportunity for students to land a job in cybersecurity with them. It worked really hard to prepare for the same and yes all said and done, Hackerone helped him immensely to achieve his career goals based solely on his technical prowess.

.One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers. and he finally becomes an ethical hacker.

Author

 * Wrote articles on blogs about hacking and penetration testing.

Books

 * Write book name Hacking is way of thinking.