Your Web News in One Place

Help Webnuz

Referal links:

Sign up for GreenGeeks web hosting
May 30, 2021 04:54 am GMT

Ethical Hacking

What is ethical hacking?

Ethical hacking, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organizations defenses. It involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Thus, unlike malicious hacking, this process is planned, approved, and more importantly, legal.

Ethical hackers improve the security posture of an organization. Ethical hackers use the same tools, tricks, and techniques that malicious hackers used, but with the permission of the authorized person. The purpose of ethical hacking is to improve the security and to defend the systems from attacks by malicious users.

Ethical hackers are often referred to as white-hat hackers. Ethical hackers learn and perform hacking in a professional manner and they are hired by organizations to look into the vulnerabilities of their systems and networks and develop solutions to prevent data breaches.
Types of ethical hacking

We can define hacking into different categories, based on what is being hacked:
Web application hacking
Social engineering
System hacking
Hacking wireless networks
Web server hacking

The process of ethical hacking

There is a six-step process that is usually performed by ethical hackers in ethical hacking.
Six phrases of ethical hacking
Reconnaissance
It is the principal stage. Here the white-hat hacker attempts to gather information about the objective. It incorporates Identifying the Target, discovering the objectives IP Address Range, DNS records, Network, and so on.

Scanning
In the stage of scanning, the hacker starts to effectively test an objective machine or organization for weaknesses that can be abused.

Gaining Access
In this stage, the hacker plans the outline of the organization of the objective and concludes that they have a few alternatives to access the organization.

Maintaining Access
In this stage, the hacker has effectively gotten entrance into a framework and introduces a few secondary passages to go into the framework when he needs access in this possessed framework in the future.

Clearing Track
In this stage, hackers clear their track. This step ensures that the attackers leave no clues or evidence behind that could be traced back.

Reporting
In this last stage of the process, the ethical hacker create a report on the findings like weaknesses found in the system and the work that was done.

There are some limitations of ethical hacking=>

Limited scope. Ethical hackers cannot progress beyond a defined scope to make an attack successful. However, its not unreasonable to discuss out of scope attack potential with the organization.

Resource constraints. Malicious hackers dont have time constraints that ethical hackers often face. Computing power and budget are additional constraints of ethical hackers.

Restricted methods. Some organizations ask experts to avoid test cases that lead the servers to crash (e.g., Denial of Service (DoS) attacks).

Benefits of ethical hacking

Implementing a secure computer network that prevents security breaches.
Discovering vulnerabilities from an attackers point of view, so that weak points can be fixed.
Helps in taking preventive actions against hackers.
Helps in building a system which prevents any kinds of penetration by hackers.
Gaining the trust of customers and investors by ensuring the security of their products and data.
Alt Text

Thank you very much for reading. Hope you get an idea about Ethical hacking.


Original Link: https://dev.to/hansikaherath/ethical-hacking-2lmh

Share this article:    Share on Facebook
View Full Article

Dev To

An online community for sharing and discovering great ideas, having debates, and making friends

More About this Source Visit Dev To