Introduction to Ethical Hacking: Hacking Methodology, Process of Malicious
Hacking, and Foot printing and scanning: Foot printing, scanning.
Enumeration: Enumeration.
System Hacking and Trojans: System Hacking, Trojans and Black Box Vs.
White Box Techniques
What is Ethical Hacking?
Hacking is the activity of identifying weaknesses in a computer system or a
network to exploit the security to gain access to personal data or business
data. An example of computer hacking can be: using a password cracking
algorithm to gain access to a computer system.
Computers have become mandatory to run a successful businesses. It is not
enough to have isolated computers systems; they need to be networked to
facilitate communication with external businesses. This exposes them to the
outside world and hacking. System hacking means using computers to
commit fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cyber crimes cost many organizations millions
of dollars every year. Businesses need to protect themselves against such
attacks.
Who is a Hacker?
A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access. Hackers are usually skilled
computer programmers with knowledge of computer security.
Types of Hackers
Hackers are classified according to the intent of their actions. The following
list classifies types of hackers according to their intent:
Ethical Hacker (White hat): A security hacker who gains access to systems
with a view to fix the identified weaknesses. They may also perform
penetration Testing and vulnerability assessments.
,Cracker (Black hat): A hacker who gains unauthorized access to computer
systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.
Grey hat: A hacker who is in between ethical and black hat hackers. He/she
breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.
Script kiddies: A non-skilled person who gains access to computer systems
using already made tools.
Hacktivist: A hacker who use hacking to send social, religious, and political,
etc. messages. This is usually done by hijacking websites and leaving the
message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in telephones
instead of computers.
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or
computer networks and coming with countermeasures that protect the
weaknesses. Ethical hackers must abide by the following rules.
• Get written permission from the owner of the computer system and/or
computer network before hacking.
• Protect the privacy of the organization been hacked.
• Transparently report all the identified weaknesses in the computer
system to the organization.
• Inform hardware and software vendors of the identified weaknesses.
Why Ethical Hacking?
Information is one of the most valuable assets of an organization. Keeping
information secure can protect an organization’s image and save an
organization a lot of money.
, Fake hacking can lead to loss of business for organizations that deal in
finance such as PayPal. Ethical hacking puts them a step ahead of the cyber
criminals who would otherwise lead to loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated in the
above section on the definition of ethical hacking. The International Council
of E-Commerce Consultants (EC-Council) provides a certification program
that tests individual’s skills. Those who pass the examination are awarded
with certificates. The certificates are supposed to be renewed after some time.
Phases of Hacking or Hacking Methodology
There are mainly 5 phases in hacking. Not necessarily a hacker has to follow
these 5 steps in a sequential manner. It’s a stepwise process and when
followed yields a better result.
Phases of hacking
1. Reconnaissance:
Hacking, and Foot printing and scanning: Foot printing, scanning.
Enumeration: Enumeration.
System Hacking and Trojans: System Hacking, Trojans and Black Box Vs.
White Box Techniques
What is Ethical Hacking?
Hacking is the activity of identifying weaknesses in a computer system or a
network to exploit the security to gain access to personal data or business
data. An example of computer hacking can be: using a password cracking
algorithm to gain access to a computer system.
Computers have become mandatory to run a successful businesses. It is not
enough to have isolated computers systems; they need to be networked to
facilitate communication with external businesses. This exposes them to the
outside world and hacking. System hacking means using computers to
commit fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cyber crimes cost many organizations millions
of dollars every year. Businesses need to protect themselves against such
attacks.
Who is a Hacker?
A Hacker is a person who finds and exploits the weakness in computer
systems and/or networks to gain access. Hackers are usually skilled
computer programmers with knowledge of computer security.
Types of Hackers
Hackers are classified according to the intent of their actions. The following
list classifies types of hackers according to their intent:
Ethical Hacker (White hat): A security hacker who gains access to systems
with a view to fix the identified weaknesses. They may also perform
penetration Testing and vulnerability assessments.
,Cracker (Black hat): A hacker who gains unauthorized access to computer
systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.
Grey hat: A hacker who is in between ethical and black hat hackers. He/she
breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.
Script kiddies: A non-skilled person who gains access to computer systems
using already made tools.
Hacktivist: A hacker who use hacking to send social, religious, and political,
etc. messages. This is usually done by hijacking websites and leaving the
message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in telephones
instead of computers.
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or
computer networks and coming with countermeasures that protect the
weaknesses. Ethical hackers must abide by the following rules.
• Get written permission from the owner of the computer system and/or
computer network before hacking.
• Protect the privacy of the organization been hacked.
• Transparently report all the identified weaknesses in the computer
system to the organization.
• Inform hardware and software vendors of the identified weaknesses.
Why Ethical Hacking?
Information is one of the most valuable assets of an organization. Keeping
information secure can protect an organization’s image and save an
organization a lot of money.
, Fake hacking can lead to loss of business for organizations that deal in
finance such as PayPal. Ethical hacking puts them a step ahead of the cyber
criminals who would otherwise lead to loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated in the
above section on the definition of ethical hacking. The International Council
of E-Commerce Consultants (EC-Council) provides a certification program
that tests individual’s skills. Those who pass the examination are awarded
with certificates. The certificates are supposed to be renewed after some time.
Phases of Hacking or Hacking Methodology
There are mainly 5 phases in hacking. Not necessarily a hacker has to follow
these 5 steps in a sequential manner. It’s a stepwise process and when
followed yields a better result.
Phases of hacking
1. Reconnaissance: