1:2 Information security Threats and Attack vectors?
An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. Attack vectors enable hackers to exploit system vulnerabilities, including the human elements.1:3 Hacking Concepts
What does Hacking mean: Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.
1:4 Ethical Hacking Concepts
The following are the basic concepts of Ethical hacking:
Phase of Pentesting.
Footprinting.
Scanning.
Enumeration.
System Hacking.
Trojans.
Viruses and Worms.
Sniffing Traffic.
Social Engineering.
Denial of service.
1: Phase of Pentesting
PenTest, like forensics, is almost as much an art as it is a science – you can only be taught so far, technical techniques and tools are all very well, but you really need a mind that can think sideways and approach a task from as many angles as possible.
2: Footprinting
Tools and tricks to get the information about the computer, IP and mac address, related user and system.
3: Scanning
Before starting the pentesting, pentester must have some information about network and system.so pentester scan the entire network with some tool like Nmap, Zenmap, ping and hping etc.
4: Enumeration
During the enumeration phase, possible entry points into the tested systems are identified. The information collected during the reconnaissance phase is put to use.
5: System Hacking
System hacking login to system without credentials not only bypass the credentials but also you can work in system as root user by privilege escalation.
6: Trojans
It is a generally non-self-replicating type of malware program containing malicious code.A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage.
7: Viruses and Worms
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections .a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
8: Sniffing Traffic
It is a program that monitors and analyzes network traffic, detecting and finding problems. Various technique and tool is used for sniffing like kali linux MITM attack, tshark, urlsnarf etc.
9: Social Engineering
In this technique,ethical hacker create the phishing page of website to obtain credential of users.
10: Denial of service
A DoS attack generally consists of efforts to temporarily interrupt or suspend or down the services of a host connected to the Internet.
Write in by MANOJKUMAR
All The Best
By Cyber Ninja
꧁UNDER SCOPE꧂
-----------------------

ConversionConversion EmoticonEmoticon