2. INDEX
Introduction
What is Ethical Hacking?
Eligibility
Ethical Hacking Tricks
Difference between Hacking and Ethical Hacking
Objective of Ethical Hacking
Methodology of Ethical Hacking
3. INTRODUCTION
Ethical hacking- also known as penetration testing or
intrusion testing or red teaming has become a major
concern for businesses and governments.
Companies are worried about the possibility of being
“hacked” and potential customers are worried about
maintaining control of personal information.
Ethical hacking work is legal because it is performed to
increase the safety in the organization. As the GEORGE
JASSON , vice – president, Comguard Networks, in an
interview to diptiman Dewan elaborates on CAREER IN
ETHICAL HACKING growing rapidly.
4. ELIGIBILITY FOR MAKING CAREER IN ETHICAL HACKING:
1. Basic knowledge of Database, Server Side Programming ( PHP or JSP
or ASP .net) and Basic Knowledge of Networking
2. Having the certification from any institute that you are expertise in
maintaining computer security
5. ETHICAL HACKING TRICKS
In a large amount of technologies ,methodology and algorithms are
used by the ethical hackers. It can range from the simple Buffer
Overflow Exploit to a SQL Injection.
Different approaches require different tricks and methods. It can
range from C/C++ to MSF (Metaspliot Framework).
6. The technical difference between ethical hacking and hacking is zero
but the moral difference is substantive.
The fact that the ethical hacker is able to protect the system implies that
he has the skills to penetrate or crash other systems and check moves
by the prospective hacker to create mischief to the organization for
which the ethical hacker is working for.
So, the difference between a white hat and a black hat is one of
perspective.
A black hat in an organization can be the white hat for other
organizations if he switches employment.
Difference between Hacking and Ethical Hacking?
7. OBJECTIVE OF ETHICAL HACKING
Ethical hacking offers an objective analysis of an organization’s
information security posture for organizations of any level of
security expertise.
"The result of such an assessment is an actionable report with
valuable remediation advice tailored to the customer's unique
IT environment, capabilities, and security objectives," says
Chris Rodriguez.
As organizations of all sizes and sophistication levels can
benefit from objective, expert, third-party analysis, ethical
hacking has become a more mainstream service in the past
decade.
8. METHODOLOGY OF ETHICAL HACKING
The various stages in the ethical hacking methodology
are:
Reconnaissance
Scanning & Enumeration
Gaining access
Maintaining access
Clearing tracks
To Know about Top Ethical Hacking Institutes in Bangalore, ClickHere
9. Reconnaissance:
This is the stage in which the hacker collects information about the
company which the personal is going to hack.
Scanning & Enumeration:
Scanning is the second phase in the hacking methodology in which the
hacker tries to make a blue print of the target network.
10. Gaining access:
This is the actual hacking phase in which the hacker
gains access to the system.
Maintaining Access:
Now the hacker is inside the system by some means by
password guessing or exploiting some of its
vulnerabilities.
Clearing Tracks:
Whenever a hacker downloads some file or installs some
software, its log will be stored in the server logs. So in
order to erase that hacker uses man tools.