WHAT IS ETHICAL HACKING?
Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages.
![]() |
ETHICAL HACKING |
The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users.
ETHICAL HACKING TECHNIQUES
PHISHING
To make it simple, let's say that facebook phishing is a way to make and create fake facebook website according to the real website for the negative purpose, such as: stealing credentials, data, etc.
KEY LOGGER
Keylogging is a technique used to hack the keystrokes produced by keyboard. in this method hacker have to install a software into the victim’s system and after that, if victim type anything from his keyboard all of his keystrokes are sent to the hacker on his Gmail or anything else.
CLICK JACKING ATTACK
Clickjacking attack allows to perform an action on victim website, Mostly Facebook and Twitter accounts are targetable. When an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to other another page, most likely owned by another application, domain, or both. It may be similar to CSRF Cross Site Request Forgeries Attack.
WATER HOLE ATTACK
The term “watering hole attack” refers to a strategy used while running targeted attacks campaigns where APT distribution is done using a trusted website which is usually visited by company employees or a target entity.
DOS ATTACKS
An attacker can select the Zombies randomly or topologically and once compromised, he sets up a command and controller to control the zombies that attack the target. A bot is a malicious software installed on compromised machines, this gives the attacker control over the zombies. The network of Bots is called botnet.
XIC is home to several global certified trainers who are subject matter experts in their respective domains. XIC has Vast experienced resources who are top experts including that of Microsoft, Cisco, Oracle, VMware, Red Hat, Novell, EC Council, Adobe, among others.
No comments:
Post a Comment