Topic 1 : Introduction To Etichal Hacking

Get Started. It's Free
or sign up with your email address
Rocket clouds
Topic 1 : Introduction To Etichal Hacking by Mind Map: Topic 1 : Introduction To Etichal Hacking

1. 1 ) What is ethical hacking ? Hacking performed by a company or individual to help identify potential threats on a computer or network.

2. 3 ) What is ethical hacker job? *break into systems legally and ethically *.Scanning ports and seeking vulnerabilities *examine patch installations and make sure that they cannot be exploited. *attempt to evade IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), honeypots, and firewalls *Sniffing networks, bypassing and cracking wireless encryption, and hijacking web servers and web applications.

3. 4 ) ethical hacking terminologies: a. Threat (potential to cause serious harm to a computer system , networks and more ) b. Exploit ( unauthorized access to computers ) c. Vulnerability ( any vulnerability about software flow,logic design, that can be attack by hacker ) d. Target of Evaluation (toe) (system, program, or network that is the subject of a security analysis or attack) e. Attack (when system weak , hackers use tools to find systems that may be vulnerable to an exploit because of the operating system, network configuration, or applications installed on the systems, and to prevent an attack f. Remote ( hacker want to attack anywhere but must have the internet )

4. 2 ) Who is Ethical hacker ? someone or known as white hat who have a skilss to find a weakness to hack something by using legitimate way by the law

5. 5 )system hacking cycle

5.1. 1 ) Reconnaissance - Target of collect information such as ip address , network , DNS , record

5.2. 2 Scanning - Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners

5.3. 3 ) Gaining access - designs the blueprint of the network of the target with the help of data collected.

5.4. 4 ) Gaining access - keep access for future exploitation and attacks

5.5. 5 ) Covering tracks - to remove all traces of the attack . Example of activity : Steganography (use picture),tunneling protoco;ls and log files

6. 6 ) Type of hackers

6.1. crackers

6.2. script kiddis (basic knowledge only)

6.3. white hat( good hackers )

6.4. grey hat ( in between good and bad hackers )

6.5. black hat ( bad hat )

6.6. suicide ( willing to die )

7. Reconnaissance

8. Clearing tracks

9. Maintaining access

10. Gaining access

11. Scanning

12. 7 ) Testing type

12.1. a. white box - have full knowledge about how to hack

12.2. b . grey box - half knowled . they know but sometimes dont know how to do

12.3. c. blackbox - no knowledge at all

13. 8 ) Way how to conduct rules of ethical hacking :

13.1. i . set goals

13.2. b . pan testing process

13.3. iii . ask permission

13.4. iv . work ethically

13.5. v . always keep record