An ethical hacker tests a security system on behalf of its owners by attempting to find and report vulnerabilities that a malicious hacker could exploit using the same methods. Ethical hacking, also known as penetration testing or intrusion testing, involves attacking a target system in various ways such as exploiting software vulnerabilities, misconfigurations, or abusing trust to assess security. While it began in government and technology sectors, ethical hacking is increasingly common outside these fields as many large companies maintain ethical hacking teams.
1 of 2
Download to read offline
More Related Content
Ethical hacking
1. An ethical hacker is a computer and increasingly common outside the
network expert who attacks a security government and technology sectors where
system on behalf of its owners, seeking it began. Many large companies, such as
vulnerabilities that a malicious hacker IBM, maintain employee teams of ethical
could exploit. hackers.
To test a security system, ethical hackers Attack Types and Vulnerabilities:
use the same methods as their less
There exist numerous ways to
principled counterparts, but report
attack a target system. It could be
problems instead of taking advantage of
achieved by exploiting known
them.
vulnerabilities in software or taking
Ethical hacking is also known as advantage of a badly configured security
penetration testing, intrusion testing and policy; it could be implemented remotely
red teaming. or internally. The techniques and
methods used are likely to vary
An ethical hacker is sometimes called a
depending on the target and they should
white hat, a term that comes from old
be chosen appropriately having assessed
Western movies, where the "good guy"
the situation fully. The attack types and
wore a white hat and the "bad guy" wore
vulnerabilities discussed in this module
a black hat.
are:
One of the first examples of ethical
hackers at work was in the 1970s, when Buffer Overflow attacks.
the United States government used Denial of Service (DoS) attacks.
groups of experts called red teams to hack Distributed Denial of Service
its own computer systems. (DDoS) attacks.
Misconfigurations.
According to Ed Skoudis, Vice
Abuse of Trust.
President of Security Strategy for
Brute force attacks.
Predictive Systems' Global Integrity
CGI and WWW services.
consulting practice, ethical hacking has
Back doors and Trojans.
continued to grow in an otherwise
lackluster IT industry, and is becoming
2. Types of Hacking:
Website Hacking
Email Hacking
Network Hacking
Password Hacking
Online banking Hacking
Computer Hacking
Advantages and disadvantages of
hacking:
Advantages-
-Can be used to recover lost
information where the computer
password has been lost.
-Teaches u that no technology is
100% secure
-None really
Disadvantages-
-Criminals can use it to their
advantage.
-It can harm someone's privacy
-Its illegal