Viewing / replacing / editing / deleting / spreading files, pictres, documents etc. which we arent supposed to.
Ethical Hacking -
Doing all of the above IF requested.
Cracking 2 types:-
1. Hash, Email ID's Cracking:- Brutefoceing Hashes such as MD5
encryption. Executive bruteforcing ditionary attacks on different Email addresses.
2. Getting access to full version of programs, softwares without purchasing the licensed key.