Ethical Hacking Notes
Ethical Hacking Notes
Hacking has been a part of computing for almost five decades and it is a very broad
discipline, which covers a wide range of topics. The first known event of hacking had
taken place in 1960 at MIT and at the same time, the term "Hacker" was originated.
network system for testing purpose. This sort of hacking is what we call Ethical
Hacking.
A computer expert who does the act of hacking is called a "Hacker". Hackers are those
who seek knowledge, to understand how systems operate, how they are designed, and
Types of Hacking
We can segregate hacking into different categories, based on what is being hacked.
Here
is a set of examples:
Website Hacking:
Network Hacking:
Email Hacking:
Ethical Hacking:
Password Hacking:
Computer Hacking:
Advantages of Hacking
Ethical hacking
Hacking is quite useful in the following scenarios:
To have a computer system that prevents malicious hackers from gaining access.
Disadvantages of Hacking
Hacking is quite dangerous if it is done with harmful intent. It can cause:
Privacy violation.
Purpose of Hacking
There could be various positive and negative intentions behind performing hacking
activities. Here is a list of some probable reasons why people indulge in hacking
activities:
Show-off
Hampering privacy
Money extortion
hat, based on their intent of hacking a system. These different terms come from old
Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy
wears
a white hat.
system, rather they try to find out weaknesses in a computer or a network system as a
Ethical hacking is not illegal and it is one of the demanding jobs available in the IT
industry.
There are numerous companies that hire ethical hackers for penetration testing and
vulnerability assessments.
unauthorized access to a system and harm its operations or steal sensitive information.
Black Hat hacking is always illegal because of its bad intent which includes stealing
etc.
malicious intent but for their fun, they exploit a security weakness in a computer
system
Miscellaneous Hackers
Apart from the above well-known classes of hackers, we have the following categories
of
usually on the level of hacking government agencies, top-secret information hubs, and
system.
Attack: An attack is an action that is done on a system to get its access and extract
sensitive data.
Back door: A back door, or trap door, is a hidden entry to a computing device or
protections.
Bot: A bot is a program that automates an action so that it can be done repeatedly
at a much higher rate for a more sustained period than a human operator could do
it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to
without their owners knowledge. Botnets are used to send spam or make denial of
Ethical hacking
service attacks.
Brute force attack: A brute force attack is an automated and the simplest kind of
usernames and passwords, over and over again, until it gets in.
Buffer Overflow: Buffer Overflow is a flaw that occurs when more data is written
with a false link to trick the recipient into providing personal information.
Cracker: A cracker is one who modifies the software to access the features which
are considered undesirable by the person cracking the software, especially copy
protection features.
Internet.
Exploit Kit: An exploit kit is software system designed to run on web servers, with
10
Keystroke logging: Keystroke logging is the process of tracking the keys which
are pressed on a computer (and which touchscreen points are used). It is simply
the map of a computer/human interface. It is used by gray and black hat hackers
to record login IDs and passwords. Keyloggers are usually secreted onto a device
Logic bomb: A virus secreted into a system that triggers a malicious action when
certain conditions are met. The most common version is the time bomb.
Master Program: A master program is the program a black hat hacker uses to
Phishing: Phishing is an e-mail fraud method in which the perpetrator sends out
Phreaker: Phreakers are considered the original computer hackers and they are
those who break into the telephone network illegally, typically to make free
longdistance
Shrink Wrap code: A Shrink Wrap code attack is an act of exploiting holes in
Spam: A Spam is simply an unsolicited email, also known as junk email, sent to a
Ethical Hacking
NMAP
Nmap stands for Network Mapper. It is an open source tool that is used widely for
network
discovery and security auditing. Nmap was originally designed to scan large networks,
but
it can work equally well for single hosts. Network administrators also find it useful for
tasks
such as network inventory, managing service upgrade schedules, and monitoring host
or
service uptime.
Nmap runs on all major computer operating systems such as Windows, Mac OS X, and
Linux.
Metasploit
Ethical hacking
Metasploit is one of the most powerful exploit tools. Its a product of Rapid7 and most
of
commercial and free edition. Matasploit can be used with command prompt or with
Web
UI.
Burp Suite
Burp Suite is a popular platform that is widely used for performing security testing of
web
applications. It has various tools that work in collaboration to support the entire testing
process, from initial mapping and analysis of an application's attack surface, through to
Burp is easy to use and provides the administrators full control to combine advanced
manual techniques with automation for efficient testing. Burp can be easily configured
and
it contains features to assist even the most experienced testers with their work.
13
Angry IP Scanner
Angry IP scanner is a lightweight, cross-platform IP address and port scanner. It can
scan
IP addresses in any range. It can be freely copied and used anywhere. In order to
increase
Angry IP Scanner simply pings each IP address to check if its alive, and then, it
resolves
its hostname, determines the MAC address, scans ports, etc. The amount of gathered
data
about each host can be saved to TXT, XML, CSV, or IP-Port list files. With help of plugins,
attacks,
Cain & Abel is a useful tool for security consultants, professional penetration testers
and
Ettercap
Ettercap stands for Ethernet Capture. It is a network security tool for
Man-in-the-Middle
attacks. It features sniffing of live connections, content filtering on the fly and many
other
interesting tricks. Ettercap has inbuilt features for network and host analysis. It
supports
You can run Ettercap on all the popular operating systems such as Windows, Linux, and
Ethical hacking
Mac OS X.
EtherPeek
EtherPeek is a wonderful tool that simplifies network analysis in a multiprotocol
heterogeneous network environment. EtherPeek is a small tool (less than 2 MB) that
can
protocols such as AppleTalk, IP, IP Address Resolution Protocol (ARP), NetWare, TCP,
UDP,
Ethical Hacking
14
SuperScan
SuperScan is a powerful tool for network administrators to scan TCP ports and resolve
hostnames. It has a user friendly interface that you can use to:
Scan any port range from a built-in list or any given range.
Modify the port list and port descriptions using the built in editor.
QualysGuard
QualysGuard is an integrated suite of tools that can be utilized to simplify security
operations and lower the cost of compliance. It delivers critical security intelligence on
demand and automates the full spectrum of auditing, compliance and protection for IT
QualysGuard includes a set of tools that can monitor, detect, and protect your global
network.
Ethical hacking
WebInspect
WebInspect is a web application security assessment tool that helps identify known and
It can also help check that a Web server is configured properly, and attempts common
web attacks such as parameter injection, cross-site scripting, directory traversal, and
more.
LC4
providing information about each node. You can obtain information about each
individual
operating system.
It can also detect registry issues and have a report set up in HTML format. For each
computer, you can list the netbios name table, current logged-on user, and Mac
address.