Introduction To Ethical Hacking
Introduction To Ethical Hacking
ETHICAL
HACKING
Chapter 1
INTRODUCTION TO
ETHICAL HACKING
about
this topic
This topic exposes the basic idea
of hacking activity. This
includes cyber laws applied in the
US and Malaysia.
learning
outcome
1.1 Understand ethical hacking
1.2 Explain type of hackers
1.3 Describe the rules of ethical
hacking
1.1
Understand ethical
hacking
A day in the life of an ethical hacker video
Ethical hacking
a. Threat
b. Exploit
c. Vulnerability
d. Target of Evaluation (toe)
e. Attack
f. Remote
threat!
Anything that has the potential to cause
serious harm to a computer system.
A threat is something that may or may
not happen, but has the potential to
cause serious damage.
Threats can lead to attacks on computer
systems, networks and more.
exploit!
An exploit is a general term for any
method used by hackers to gain
unauthorized access to computers, the act
itself of a hacking attack, or a hole in a
system's security that opens a system to an
attack.
exploit!
A piece of software or technology that takes advantage
of a bug, glitch, or vulnerability, leading to
unauthorized access, privilege escalation, or denial of
service on a computer system. Malicious hackers are
looking for exploits in computer systems to open the
door to an initial attack.
Most exploits are small strings of computer code that,
when executed on a system, expose vulnerability.
Experienced hackers create their own exploits, but it is
not necessary to have any programming skills to be an
ethical hacker as many hacking software programs
have ready-made exploits that can be launched
against a computer system or network.
An exploit is a defined way to breach the security of an
IT system through a vulnerability.
vulnerability
grey
has knowledge that
might be
relevant to a specific
box no information
skills required to be an
ethical hacker
Infosec
Routers
Communication & report writing
Knowledge of threat sources
Project manager
Problem mngmt
Network protocols
Firewall
career ethical hacker
ways to conduct
ethical hacking
reading
legal implications
of hacking