Ethical Hacking Series : Chunk 1
Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network.
Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes.
Penetration testing and vulnerability assessing are the basic types of test ethical hackers perform so as to check the drawback in the systems. These drawbacks (or weak part) of the system are termed as Vulnerability or a security hole. Vulnerabilities can be in program or network or the hardware. Physical and technical are basic classification of vulnerabilities.
There are general vulnerabilities in system or programs. Like windows XP or OS X have some known vulnerabilities. By exploiting those vulnerabilities crackers generally try to intrude the system. They first comes the network(LAN or WAN) of the victim company . And from that they try to access the databases of company which have very sensitive data.
Eavesdroppers also sniff the data packets from communication lines to get the more information. They come to Network by Passive Information Gathering which is the first stage of attack.
Ethical hackers usually take tests to find the severe vulnerabilities in network and then they shield it by various methods.
We’ll concentrate on these tests and securing methods in next chunks of the series. ( Includes White Box, Black Box test , Penetration and vulnerability assessments.)
So Watch out for our next post.