Introduction of Ethical Hacking

In the early days of the Internet, the World Wide Web consisted only of websites. These were essentially information repositories containing static documents.Today, the World Wide Web is almost unrecognizable from its earlier form. The majority of sites on the web are in fact applications. They are highly functional and rely on two-way flow of information between the server and browser.
Web applications bring with them new and significant security threats. Each application is different and may contain unique vulnerabilities. Most applications are developed in-house — many by developers who have only a partial understanding of the security problems that may arise in the code they are producing. New technologies have been developed that have introduced new possibilities for exploitation. Some categories of flaws have largely gone away as the result of changes made to web browser software.
The most serious attacks against web applications are those that expose sensitive data or gain unrestricted access to the back-end systems on which the application is running.


You should have enough knowledge about computer networks as well how computer works to start hacking . There are different types of hacking, and according to that type prerequisites might change. For instance, if you are going to deal with web hacking then some knowledge of web & web technologies ( html, php, sql..etc) is required. You might know that most of hacking is done on Linux so basic understanding of Linux is required.