A Survey on Ethical Hacking Techniques

Authors

  • Sathya J Dept. of Computer Science, E.G.S. Pillay Arts and Science College, Nagapatttinam, Tamilnadu, India
  • Manivannan T Dept. of Computer Science, E.G.S. Pillay Arts and Science College, Nagapatttinam, Tamilnadu, India

Keywords:

Hackers, Ethical Hacking, Hacking Phases

Abstract

Hacking is a task in which, a person utilize the weakness in a system for self-profit or indulgence. Ethical hacking is an indistinguishable activity which aims to find and rectify the weakness in a system. In the growing era of internet computer security is of utmost concern for the organizations and government. These companies are using Internet in their wide variety of applications such as marketing, electronic commerce, and database access. But at the same time, data and network security is a serious issue that has to be talked about. This paper attempts to discuss the overview of hacking and how ethical hacking disturbs the security. Also the Ethical Hackers and Malicious Hackers are different from each other and playing their important roles in security. This paper studied the different types of hacking with its phases. The hacking can also be categorized majorly in three categories such as white hat, black hat and grey hat hacking. This paper also presents a comparison of the hacking categories with different methods of penetration testing

References

[1] Agarwal, AnkitKumar, Hacking : Research paper, online http://ankitkumaragarwal.com /hacking-a-research- paper/ (visited on may2012)

[2] Wilhelm, Douglas. "2". Professional Penetration Testing.Syngress Press. p. 503.ISBN 978-1-59749-425-0

[3] Moore, Robert (2006). Cybercrime: Investigating High- Technology Computer Crime (1st ed.). Cincinnati, Ohio: [4] Anderson Publishing. ISBN 978-1-59345-303-9

[5] EC-Council (n.d.). Ethical Hacking and Countermeasures, online http://www.eccouncil.org/ipdf/EthicalHacker.pdf (visited on may 2012)

[6] Ethical Hacking Basics Class part , online http://www.go4expert.com/forums/ showthread.php?t=11925 (visited on may 2012)

[7] Palmer, C.C.(2001,April 13). Ethical Hacking. IBM Systems Journal Vol. 40 No.3 2001

[8] Http://1000projects.org/how-is-ethical-hacking-done-cs- studentproject-seminar.html

[9] en.wikipedia.org/wiki/Penetration_testing

[10] About Effective Penetration Testing Methodology byByeong-Ho KANG

Downloads

Published

2025-11-24

How to Cite

[1]
J. Sathya and T. Manivannan, “A Survey on Ethical Hacking Techniques”, Int. J. Comp. Sci. Eng., vol. 7, no. 4, pp. 92–96, Nov. 2025.