A Survey on Ethical Hacking Techniques
Keywords:
Hackers, Ethical Hacking, Hacking PhasesAbstract
Hacking is a task in which, a person utilize the weakness in a system for self-profit or indulgence. Ethical hacking is an indistinguishable activity which aims to find and rectify the weakness in a system. In the growing era of internet computer security is of utmost concern for the organizations and government. These companies are using Internet in their wide variety of applications such as marketing, electronic commerce, and database access. But at the same time, data and network security is a serious issue that has to be talked about. This paper attempts to discuss the overview of hacking and how ethical hacking disturbs the security. Also the Ethical Hackers and Malicious Hackers are different from each other and playing their important roles in security. This paper studied the different types of hacking with its phases. The hacking can also be categorized majorly in three categories such as white hat, black hat and grey hat hacking. This paper also presents a comparison of the hacking categories with different methods of penetration testing
References
[1] Agarwal, AnkitKumar, Hacking : Research paper, online http://ankitkumaragarwal.com /hacking-a-research- paper/ (visited on may2012)
[2] Wilhelm, Douglas. "2". Professional Penetration Testing.Syngress Press. p. 503.ISBN 978-1-59749-425-0
[3] Moore, Robert (2006). Cybercrime: Investigating High- Technology Computer Crime (1st ed.). Cincinnati, Ohio: [4] Anderson Publishing. ISBN 978-1-59345-303-9
[5] EC-Council (n.d.). Ethical Hacking and Countermeasures, online http://www.eccouncil.org/ipdf/EthicalHacker.pdf (visited on may 2012)
[6] Ethical Hacking Basics Class part , online http://www.go4expert.com/forums/ showthread.php?t=11925 (visited on may 2012)
[7] Palmer, C.C.(2001,April 13). Ethical Hacking. IBM Systems Journal Vol. 40 No.3 2001
[8] Http://1000projects.org/how-is-ethical-hacking-done-cs- studentproject-seminar.html
[9] en.wikipedia.org/wiki/Penetration_testing
[10] About Effective Penetration Testing Methodology byByeong-Ho KANG
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
