Session:1
(2)Ethical Hacking 
Introduction to Ethical Hacking



1:2 Information security Threats and                Attack vectors?

An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. Attack vectors enable hackers to exploit system vulnerabilities, including the human elements.

1:3 Hacking Concepts

What does Hacking mean: Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.

1:4 Ethical Hacking Concepts

The following are the basic concepts of Ethical hacking:

Phase of Pentesting. 
Footprinting. 
Scanning. 
Enumeration. 
System Hacking. 
Trojans.
Viruses and Worms.
Sniffing Traffic.
Social Engineering.
Denial of service.

1: Phase of Pentesting

PenTest, like forensics, is almost as much an art as it is a science – you can only be taught so far, technical techniques and tools are all very well, but you really need a mind that can think sideways and approach a task from as many angles as possible.

2: Footprinting

Tools and tricks to get the information about the computer, IP and mac address, related user and system.

3: Scanning

Before starting the pentesting, pentester must have some information about network and system.so pentester scan the entire network with some tool like Nmap, Zenmap, ping and hping etc.

4: Enumeration

During the enumeration phase, possible entry points into the tested systems are identified. The information collected during the reconnaissance phase is put to use.

5: System Hacking

System hacking login to system without credentials not only bypass the credentials but also you can work in system as root user by privilege escalation.

6: Trojans

It is a generally non-self-replicating type of malware program containing malicious code.A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage.

7: Viruses and Worms

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections .a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.

8: Sniffing Traffic

It is a program that monitors and analyzes network traffic, detecting and finding problems. Various technique and tool is used for sniffing like kali linux MITM attack, tshark, urlsnarf etc.

9: Social Engineering

In this technique,ethical hacker create the phishing page of website to obtain credential of users.

10: Denial of service

A DoS attack generally consists of efforts to temporarily interrupt or suspend or down the services of a host connected to the Internet.

Write in by MANOJKUMAR

All The Best

By Cyber Ninja
꧁UNDER SCOPE꧂
       -----------------------
Previous
Next Post »