What Is Ethical Hacking - Cyber Thieve

Ethical Hacking


Ethical hacking is a process to gaining access of a computer or a organisation for the improving the security of the organisation or a device.
Ethical hacking is a authorised process to practice of detecting vulnerabilities in an application, system, or organisation's infrastructure and bypassing system security to identify potential data breaches and threats in that particular network.
Ethical hacking is also known as white hat hacking or Penetration Testing. Who does this work known as ethical hacker, White Hat Hacker or a Security Expert .
Ethical Hacker also uses the same tool, techniques and OS to gain the access to the system but with the all permission of authorised person and authority.




Related Posts : 


What Is Hacking :

Hacking is same as Ethical Hacking but in the hacking the hacker attack on someone's system and steal the confidential information without owner's knowledge.

Needs of Ethical Hacking

  • Testing password strength
  • Ensuring security settings and privilege levels in the domain account and database administration by testing out exploits
  • Penetration testing after every software update/upgrade or after adding a new security patch
  • Ensuring that data communication channels cannot be intercepted
  • Testing validity of authentication protocols
  • Ensuring security features in applications, which protect organizational and user databases
  • Defence against denial-of-service attacks
  • Network security and testing of anti-intrusion features

Ethical Hacking : Types 

We can define hacking into different categories, based on what is being hacked.
  • Network Hacking
  • Website Hacking
  • Computer Hacking
  • Password Hacking
  • Email Hacking
  • Wireless Hacking
  • Social Engineering

Network Hacking : 

Network Hacking is all about hacking the networks in this type of hacking hacker gather the required information about the network to harm , stop the service of a network and steal valuable information from that network. Tools used in it like Telnet, NS lookup, Ping etc.

Website Hacking :

Website hacking is gaining access to the web server .

Computer Hacking :

Computer hacking is attacking someone's PC and steal the information.

Password Hacking :

Password hacking is recovering the password to gain access to the system it can be password gassing , dictionary attack or cracking the hash file.

Email Hacking :

Email hacking is email hacking and use it to do illegal activity.

Wireless Hacking :

Because wireless networks use radio waves to transmit, a hacker can easily squirt the system from either a location nearby. To discover the Identifier and bodge a wireless network, often these assailants use network snorting.

Social Engineering :

The art of manipulating the masses so that they divulge sensitive information is known as social engineering. Eugenics is used by criminals since it is generally easier to attack your organic hard time trusting than it is to figure out how to spoof your device.

Phases of Hacking

conducting a hacking. These grouped steps are called phases.
There is a general consensus among the entities and information security
professionals that these phases are 5 in the following order
  1. Reconnaissance
  2. Scanning
  3. Gaining Access
  4. Maintaining Access
  5. Erasing Clues


Reconnaissance : 

first phase in the implementation of a hacking. The aim of this phase is to discover as much relevant information as we can from the client’s organisation or victim. Depending of the magnitude and certainty of the information collected we’ll be
able to conduct a better analysis later. Therefore, it is important to dedicate our best effort to this stage.
  • Passive reconnaissance
Internet directory enquiries
Search in the newspaper for job ads in the IT department of Company X.
Searches on social networks
Retrieving information from the trash.
  • Active Reconnaissance
Ping sweeps to determine the active public computers within a range of IP’s.
Connecting to a service port in order to gather a banner and try to determine the software version.Using social engineering to obtain confidential information.
Make a network mapping to determine the existence of a firewall or border router.

Ethical Hacker : Tasks

Let’s talk about the Certified Ethical Hacker’s responsibilities:

  • Meeting with your client to go through the security systems currently put in place
  • Verifying the organization’s system, network topology, and vulnerable entry points
  • Performing penetration testing on the system.
  • Identifying and documenting security flaws and vulnerabilities
  • Testing the level of security in the network
  • Finding out the best security solutions
  • Creating penetration test reports
  • Performing penetration testing after the implementation of suggested or new security features
  • Finding out alternatives to security features, which are not working

Advantages Of Hacking

  • There are various advantages of hacking:It is used to recover the lost of information, especially when you lost your password.
  • It is used to perform penetration testing to increase the security of the computer and network.
  • It is used to test how good security is on your network.

Disadvantages Of Hacking

  • There are various disadvantages of hacking:It can harm the privacy of someone.
  • Hacking is illegal.
  • Criminal can use hacking to their advantage.
  • Hampering system operations.
Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Learn More
Ok, Go it!