SlideShare a Scribd company logo
1 of 9
Download to read offline
DR.SNS Rajalakshmi College of
Arts and Science
BSC (IT)
MITHUN.J.V.
Abstract:
Hacking is basically expertise in any field. Hackers are
classified as per working and as per knowledge. The
ethical hackers come under white hat hackers.
Ethical hackers use hacking techniques in order to
provide security. They are legally authorized hackers.
Introduction to ethical hacking:
Ethical hacking is an authorized practice of detecting
vulnerabilities in an application, system, or organization's
infrastructure and bypassing system security to identify
potential data breaches and threats in a network
Ethical hacker is an individual who uses hacking skills to
identify security vulnerabilities in hardware, software or
networks. However,they respect the rule of law as it
applies to hacking.
Ethical hacking process :
There is six-step usually performed by ethical hackers in
the ethical hacking process.
1)Reconnaissance –
It is the principal stage where the Hacker attempts to
gather data about the objective. It incorporates
Identifying the Target, discovering the objective’s IP
Address Range, DNS records, Network, and so on.
2) Scanning –
In this stage, the hacker starts to effectively test an
objective machine or organization for weaknesses that
can be abused. It incorporates the utilization of
apparatuses like dialers, network mappers, sweepers,
port scanners, and weakness scanners to check
information.
3) Gaining Access –
In this stage, the hacker plans the outline of the
organization of the objective with the assistance of
information gathered during observation and checking.
The hacker has got done with identifying and checking
the organization and now concludes that they have a few
alternatives to access the organization.
4) Maintaining Access –
It is the interaction where the hacker has effectively
gotten entrance into a framework. By getting entrance,
the hacker introduces a few secondary passages to go
into the framework when he needs access in this
possessed framework in the future. Metasploit is the
favored apparatus in this cycle.
5)Clearing Tracks –
This process is basically an unethical activity. It has to do
with the erasure of logs of the multitude of exercises that
occur during the hacking interaction.
6)Reporting –
It is the last step of finishing the ethical hacking process.
In this the Ethical Hacker aggregates a report with his
discoveries and the work that was done, for example, the
instruments utilized, weaknesses found, the achievement
rate, and the endeavor measures
ADVANTAGES and DISADVANTAGES of ETHICAL
HACKING
Advantages of Ethical Hacking :
1) This helps to fight against cyber terrorism and to fight
against national security breaches.
2) This helps to take preventive action against hackers.
3) This helps to build a system that prevents any kinds of
penetration by hackers.
4) This offers security to banking and financial
establishments.
5) This helps to identify and close the open holes in a
computer system or network.
Disadvantages of Ethical Hacking :
1) This may corrupt the files or data of an organization.
2) They might use information gained for malicious use.
Subsequently, trustful programmers are expected to
have achievement in this framework.
3) By hiring such professionals will increase costs to the
company.
4) This technique can harm someone’s privacy.
5) It hampers system operation
Types of Ethical Hacking:
1)Black-box Testing
Black-box testing is a method of software testing that
examines the functionality of an application without
peering into its internal structures or workings. This
method of test can be applied virtually to every level of
software testing: unit, integration, system and
acceptance.
2) White-box Testing
White-box testing is a method of software testing that
tests internal structures or workings of an application, as
opposed to its functionality. In white-box testing, an
internal perspective of the system is used to design test
cases.
3) Gray-box Testing
Gray-box testing is a combination of white-box testing
and black-box testing. The aim of this testing is to search
for the defects, if any, due to improper structure or
improper usage of applications.
4) Web Application Hacking
Web hacking refers to exploitation of applications via
HTTP which can be done by manipulating the application
via its graphical web interface, tampering the Uniform
Resource Identifier (URI) or tampering HTTP elements
not contained in the URI.
5) Hacking Wireless Networks
Wireless hacking can be defined as an attack on wireless
networks or access points that offer confidential
information such as authentication attacks, wifi
passwords, admin portal access, and other similar data.
Wireless hacking is performed for gaining unauthorized
access to a private wifi network.
6) Social engineering
Social engineering is a manipulation technique that
exploits human error to gain private information, access,
or valuables. In cybercrime, these “human hacking”
scams tend to lure unsuspecting users into exposing
data, spreading malware infections, or giving access to
restricted systems.
7) System hacking
System hacking is defined as the compromise between
computer systems and software to access the target
computer and steal or misuse their sensitive information.
The malware and the attacker identify and exploit the
vulnerability of the computer system to gain
unauthorized access.
8) Web server hacking
Web content is generated in real time by a software
application running at server-side. So hackers attack on
the web server to steal credential information ,
passwords, and business information by using DoS
(DDos) attacks, SYN flood, ping flood, port scan, sniffing
attacks, and social engineering attacks.
Conclusion :
Ethical hacking can help in lot of ways like it strengthens
computer and network security by performing
penetration testing, it enables one to take preventive
measures to avoid any security breach situations.
AUTHOR NAME
MITHUN.J.V
THANK YOU!!!

More Related Content

Similar to BSC IT Ethical Hacking Process and Types

A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingHassanAhmedShaikh1
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases AIRCC Publishing Corporation
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESijcsit
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxyoufanlimboo
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Access control attacks
Access control attacksAccess control attacks
Access control attacksYaakub Idris
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET Journal
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingMissStevenson1
 

Similar to BSC IT Ethical Hacking Process and Types (20)

A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive CheatsheetEthical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive Cheatsheet
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Access control attacks
Access control attacksAccess control attacks
Access control attacks
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

BSC IT Ethical Hacking Process and Types

  • 1. DR.SNS Rajalakshmi College of Arts and Science BSC (IT) MITHUN.J.V.
  • 2. Abstract: Hacking is basically expertise in any field. Hackers are classified as per working and as per knowledge. The ethical hackers come under white hat hackers. Ethical hackers use hacking techniques in order to provide security. They are legally authorized hackers. Introduction to ethical hacking: Ethical hacking is an authorized practice of detecting vulnerabilities in an application, system, or organization's infrastructure and bypassing system security to identify potential data breaches and threats in a network Ethical hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However,they respect the rule of law as it applies to hacking. Ethical hacking process : There is six-step usually performed by ethical hackers in the ethical hacking process.
  • 3. 1)Reconnaissance – It is the principal stage where the Hacker attempts to gather data about the objective. It incorporates Identifying the Target, discovering the objective’s IP Address Range, DNS records, Network, and so on. 2) Scanning – In this stage, the hacker starts to effectively test an objective machine or organization for weaknesses that can be abused. It incorporates the utilization of apparatuses like dialers, network mappers, sweepers, port scanners, and weakness scanners to check information. 3) Gaining Access – In this stage, the hacker plans the outline of the organization of the objective with the assistance of information gathered during observation and checking. The hacker has got done with identifying and checking the organization and now concludes that they have a few alternatives to access the organization.
  • 4. 4) Maintaining Access – It is the interaction where the hacker has effectively gotten entrance into a framework. By getting entrance, the hacker introduces a few secondary passages to go into the framework when he needs access in this possessed framework in the future. Metasploit is the favored apparatus in this cycle. 5)Clearing Tracks – This process is basically an unethical activity. It has to do with the erasure of logs of the multitude of exercises that occur during the hacking interaction. 6)Reporting – It is the last step of finishing the ethical hacking process. In this the Ethical Hacker aggregates a report with his discoveries and the work that was done, for example, the instruments utilized, weaknesses found, the achievement rate, and the endeavor measures ADVANTAGES and DISADVANTAGES of ETHICAL HACKING
  • 5. Advantages of Ethical Hacking : 1) This helps to fight against cyber terrorism and to fight against national security breaches. 2) This helps to take preventive action against hackers. 3) This helps to build a system that prevents any kinds of penetration by hackers. 4) This offers security to banking and financial establishments. 5) This helps to identify and close the open holes in a computer system or network. Disadvantages of Ethical Hacking : 1) This may corrupt the files or data of an organization. 2) They might use information gained for malicious use. Subsequently, trustful programmers are expected to have achievement in this framework. 3) By hiring such professionals will increase costs to the company. 4) This technique can harm someone’s privacy. 5) It hampers system operation
  • 6. Types of Ethical Hacking: 1)Black-box Testing Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied virtually to every level of software testing: unit, integration, system and acceptance. 2) White-box Testing White-box testing is a method of software testing that tests internal structures or workings of an application, as
  • 7. opposed to its functionality. In white-box testing, an internal perspective of the system is used to design test cases. 3) Gray-box Testing Gray-box testing is a combination of white-box testing and black-box testing. The aim of this testing is to search for the defects, if any, due to improper structure or improper usage of applications. 4) Web Application Hacking Web hacking refers to exploitation of applications via HTTP which can be done by manipulating the application via its graphical web interface, tampering the Uniform Resource Identifier (URI) or tampering HTTP elements not contained in the URI. 5) Hacking Wireless Networks Wireless hacking can be defined as an attack on wireless networks or access points that offer confidential information such as authentication attacks, wifi passwords, admin portal access, and other similar data. Wireless hacking is performed for gaining unauthorized access to a private wifi network.
  • 8. 6) Social engineering Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems. 7) System hacking System hacking is defined as the compromise between computer systems and software to access the target computer and steal or misuse their sensitive information. The malware and the attacker identify and exploit the vulnerability of the computer system to gain unauthorized access. 8) Web server hacking Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information , passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.
  • 9. Conclusion : Ethical hacking can help in lot of ways like it strengthens computer and network security by performing penetration testing, it enables one to take preventive measures to avoid any security breach situations. AUTHOR NAME MITHUN.J.V THANK YOU!!!