Ethical Hacking
Ethical Hacking involves an authorised attempt to gain unauthorized access to a computer system application or data. Also known as White hats.
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply, it is the unauthorized access to control
over computer network security system for some illicit purpose. They can destroy, steal or eeven prevent authorised userd from accessing the system.
There are main three thpes of hacker:
# White Hats: Also known as ethical hackers they are often employed or contracted by companies and government entities, working as security specialists
looking for vulnerabilities.
# Black Hats: These hackers are normally responsible for creating malwares, which is frequently used to infilterate computerized network and systems.
# Grey Hats: As the name suggests, these individuals utilize aspect from black black and white hat hackers, but will ususally seek out vulnorabilities
in a system whithout an owners permission or knowledge.
# Steps of Ethical Hacking:
Reconnaissance (Foot Printing)
Scanning
Exploitation
Maintaining access
Clearing Tracks
# Footprinting: Reconaissance, Information Gathering, Enumeration, Discovery, First step of hacking.
# Scanning: Secondary step of hacking, process of finding, security related loop holes and weaknesses (vulnerabilities).
# Exploitation: Process of gaining unauthorized access.
# Maintaining Access: Process of creating backdoor and hidden entries and privileges escalator.
# Clearing tracks: Log cleaning process.
Comments
Post a Comment