0% found this document useful (0 votes)
39 views

Hacking - 13 September 2020

The document discusses ethical hacking. It defines hacking and differentiates ethical hacking, which involves legally testing systems for vulnerabilities to help strengthen security, from malicious hacking. The process of ethical hacking involves reconnaissance, scanning and enumeration to identify vulnerabilities, gaining access to exploit them, maintaining access for future testing, and finally reporting findings. Important tools for ethical hacking are also listed, along with advantages like improving security and disadvantages like cost.

Uploaded by

j4k4l0d4n9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Hacking - 13 September 2020

The document discusses ethical hacking. It defines hacking and differentiates ethical hacking, which involves legally testing systems for vulnerabilities to help strengthen security, from malicious hacking. The process of ethical hacking involves reconnaissance, scanning and enumeration to identify vulnerabilities, gaining access to exploit them, maintaining access for future testing, and finally reporting findings. Important tools for ethical hacking are also listed, along with advantages like improving security and disadvantages like cost.

Uploaded by

j4k4l0d4n9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Ethical Hacking

By: Renelyn Tuazon


4CpE-1
What is Hacking?
• act of finding the possible entry points that
exist in a computer system or a computer
network and finally entering into them.
• usually done to gain unauthorized access to
a computer system or a computer network,
either to harm the systems or to steal
sensitive information available on the
computer.
• A computer expert who does the act of
hacking is called a “Hacker".

• Hackers are those who seek knowledge,


to understand how systems operate, how
they are designed, and then attempt to
play with these systems.
Ethical Hacking

• Hacking is usually legal as long as it is


being done to find weaknesses and help
identify potential threats in a computer or
network system for testing purpose. This
sort of hacking is what we call Ethical
Hacking.
• An ethical hacker attempts to bypass
system security and search for any
weak points that could be exploited by
malicious hackers.
Ethical Hacker Commandments:

• Work Ethically
• Respect Privacy
• Avoid Crashes of your Systems
Ethical Hacking - Process
Reconnaissance

• Reconnaissance is a set of
processes and techniques
used to covertly discover
and collect information
about a target system.

• refers to preparatory phase


where an attacker learns
about all of the possible
attack vectors that can be
used in their plan.
Scanning and Enumeration
• Scanning is the process
where the attacker begins
to actively probe a target
machine or network for
vulnerabilities that can be
exploited.

• Enumeration is the ability


of the hacker to convince
some servers to give them
information that is vital to
them to make an attack.
Gaining Access

• In this process, the


vulnerability is located
and you attempt to exploit
it in order to enter
into the system.

• This is the actual hacking


phase in which the
hacker gains access to
the system.
Maintaining Access

• After gaining access,


the hacker installs some
backdoors in order to
enter into the system
when he needs access
in this owned system in
future.
Clearing Tracks
• “Everybody knows a
good hacker but
nobody knows a great
hacker.”

• This process is
actually an unethical
activity. It has to do
with the deletion of
logs of all the activities
that take place during
the hacking process.
Reporting

• Reporting is the last step


of finishing the ethical
hacking process. Here the
Ethical Hacker compiles a
report with his findings
and the job that was done
such as the tools used,
the success rate,
vulnerabilities found, and
the exploit processes .
Ethical Hacking Tools

• Nmap (Network Mapper)


• Metasploit
• Burp Suite
• Angry IP Scanner
• Cain and Abel
Advantages:

• Helps in closing the open holes in the


system network
• Provides security to banking and financial
establishments
• Prevents website defacements
Disadvantages:

• All depends upon the trustworthiness of


the ethical hacker.

• Hiring professionals is expensive.


References:

• http://www.dummies.com/programming/netwo
• https://www.tutorialspoint.com/ethical_hac
king/ethical_hacking_pdf_version.htm

You might also like