Hello Everyone,
I am MITHUN.J.V currently pursuing my graduate at BSC in the field of INFORMATION TECHNOLOGY at DR.SNS RAJALAKSHMI COLLEGE OF ARTS AND SCIENCE and this is my reseach paper based on ethical hacking,advantages and disadvantages OF HACKING,types of hacking etc...
2. Abstract:
Hacking is basically expertise in any field. Hackers are
classified as per working and as per knowledge. The
ethical hackers come under white hat hackers.
Ethical hackers use hacking techniques in order to
provide security. They are legally authorized hackers.
Introduction to ethical hacking:
Ethical hacking is an authorized practice of detecting
vulnerabilities in an application, system, or organization's
infrastructure and bypassing system security to identify
potential data breaches and threats in a network
Ethical hacker is an individual who uses hacking skills to
identify security vulnerabilities in hardware, software or
networks. However,they respect the rule of law as it
applies to hacking.
Ethical hacking process :
There is six-step usually performed by ethical hackers in
the ethical hacking process.
3. 1)Reconnaissance –
It is the principal stage where the Hacker attempts to
gather data about the objective. It incorporates
Identifying the Target, discovering the objective’s IP
Address Range, DNS records, Network, and so on.
2) Scanning –
In this stage, the hacker starts to effectively test an
objective machine or organization for weaknesses that
can be abused. It incorporates the utilization of
apparatuses like dialers, network mappers, sweepers,
port scanners, and weakness scanners to check
information.
3) Gaining Access –
In this stage, the hacker plans the outline of the
organization of the objective with the assistance of
information gathered during observation and checking.
The hacker has got done with identifying and checking
the organization and now concludes that they have a few
alternatives to access the organization.
4. 4) Maintaining Access –
It is the interaction where the hacker has effectively
gotten entrance into a framework. By getting entrance,
the hacker introduces a few secondary passages to go
into the framework when he needs access in this
possessed framework in the future. Metasploit is the
favored apparatus in this cycle.
5)Clearing Tracks –
This process is basically an unethical activity. It has to do
with the erasure of logs of the multitude of exercises that
occur during the hacking interaction.
6)Reporting –
It is the last step of finishing the ethical hacking process.
In this the Ethical Hacker aggregates a report with his
discoveries and the work that was done, for example, the
instruments utilized, weaknesses found, the achievement
rate, and the endeavor measures
ADVANTAGES and DISADVANTAGES of ETHICAL
HACKING
5. Advantages of Ethical Hacking :
1) This helps to fight against cyber terrorism and to fight
against national security breaches.
2) This helps to take preventive action against hackers.
3) This helps to build a system that prevents any kinds of
penetration by hackers.
4) This offers security to banking and financial
establishments.
5) This helps to identify and close the open holes in a
computer system or network.
Disadvantages of Ethical Hacking :
1) This may corrupt the files or data of an organization.
2) They might use information gained for malicious use.
Subsequently, trustful programmers are expected to
have achievement in this framework.
3) By hiring such professionals will increase costs to the
company.
4) This technique can harm someone’s privacy.
5) It hampers system operation
6. Types of Ethical Hacking:
1)Black-box Testing
Black-box testing is a method of software testing that
examines the functionality of an application without
peering into its internal structures or workings. This
method of test can be applied virtually to every level of
software testing: unit, integration, system and
acceptance.
2) White-box Testing
White-box testing is a method of software testing that
tests internal structures or workings of an application, as
7. opposed to its functionality. In white-box testing, an
internal perspective of the system is used to design test
cases.
3) Gray-box Testing
Gray-box testing is a combination of white-box testing
and black-box testing. The aim of this testing is to search
for the defects, if any, due to improper structure or
improper usage of applications.
4) Web Application Hacking
Web hacking refers to exploitation of applications via
HTTP which can be done by manipulating the application
via its graphical web interface, tampering the Uniform
Resource Identifier (URI) or tampering HTTP elements
not contained in the URI.
5) Hacking Wireless Networks
Wireless hacking can be defined as an attack on wireless
networks or access points that offer confidential
information such as authentication attacks, wifi
passwords, admin portal access, and other similar data.
Wireless hacking is performed for gaining unauthorized
access to a private wifi network.
8. 6) Social engineering
Social engineering is a manipulation technique that
exploits human error to gain private information, access,
or valuables. In cybercrime, these “human hacking”
scams tend to lure unsuspecting users into exposing
data, spreading malware infections, or giving access to
restricted systems.
7) System hacking
System hacking is defined as the compromise between
computer systems and software to access the target
computer and steal or misuse their sensitive information.
The malware and the attacker identify and exploit the
vulnerability of the computer system to gain
unauthorized access.
8) Web server hacking
Web content is generated in real time by a software
application running at server-side. So hackers attack on
the web server to steal credential information ,
passwords, and business information by using DoS
(DDos) attacks, SYN flood, ping flood, port scan, sniffing
attacks, and social engineering attacks.
9. Conclusion :
Ethical hacking can help in lot of ways like it strengthens
computer and network security by performing
penetration testing, it enables one to take preventive
measures to avoid any security breach situations.
AUTHOR NAME
MITHUN.J.V
THANK YOU!!!