Submit Search
Upload
A COMPREHENSIVE STUDY ON ETHICAL HACKING
âą
0 likes
âą
9 views
Scott Bou
Follow
Essay Writing Service http://StudyHub.vip/A-COMPREHENSIVE-STUDY-ON-ETHICAL-HACKIN đ
Read less
Read more
Education
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Cyber Security
Cyber Security
BryCunal
Â
Cyber Security
Cyber Security
Ramiro Cid
Â
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
Â
presentation on hacking
presentation on hacking
Ayush Upadhyay
Â
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
MithunJV
Â
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
Â
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
Â
Cyber Security PPT
Cyber Security PPT
ashish kumar
Â
Recommended
Cyber Security
Cyber Security
BryCunal
Â
Cyber Security
Cyber Security
Ramiro Cid
Â
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
Â
presentation on hacking
presentation on hacking
Ayush Upadhyay
Â
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
MithunJV
Â
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
Â
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
Â
Cyber Security PPT
Cyber Security PPT
ashish kumar
Â
Ethical Hacking
Ethical Hacking
Nitheesh Adithyan
Â
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
Â
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
Â
Computer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
Â
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection System
International Journal of Engineering Inventions www.ijeijournal.com
Â
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
Â
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
Â
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
Haris Chughtai
Â
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
Â
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
Â
N.vinodh
N.vinodh
vinodhkn
Â
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
AnkitShaw27
Â
Ethical hacking
Ethical hacking
Mohammad Affan
Â
E04 05 2841
E04 05 2841
International Journal of Engineering Inventions www.ijeijournal.com
Â
Hamza
Hamza
HamzaBaqee
Â
CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
Â
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
CSCJournals
Â
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
Â
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
DamaineFranklinMScBE
Â
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
Â
đ College Argumentative Essay. 16 Easy Argumenta.pdf
đ College Argumentative Essay. 16 Easy Argumenta.pdf
Scott Bou
Â
Teagan Education Consulting Columbia College Chicago
Teagan Education Consulting Columbia College Chicago
Scott Bou
Â
More Related Content
Similar to A COMPREHENSIVE STUDY ON ETHICAL HACKING
Ethical Hacking
Ethical Hacking
Nitheesh Adithyan
Â
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
Â
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
Â
Computer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
Â
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection System
International Journal of Engineering Inventions www.ijeijournal.com
Â
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
Â
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
Â
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
Haris Chughtai
Â
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
IRJET Journal
Â
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
Â
N.vinodh
N.vinodh
vinodhkn
Â
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
AnkitShaw27
Â
Ethical hacking
Ethical hacking
Mohammad Affan
Â
E04 05 2841
E04 05 2841
International Journal of Engineering Inventions www.ijeijournal.com
Â
Hamza
Hamza
HamzaBaqee
Â
CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
Â
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
CSCJournals
Â
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
Â
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
DamaineFranklinMScBE
Â
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
Â
Similar to A COMPREHENSIVE STUDY ON ETHICAL HACKING
(20)
Ethical Hacking
Ethical Hacking
Â
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Â
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Â
Computer-Security.pptx
Computer-Security.pptx
Â
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection System
Â
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
Â
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Â
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
Â
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
Â
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
Â
N.vinodh
N.vinodh
Â
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
Â
Ethical hacking
Ethical hacking
Â
E04 05 2841
E04 05 2841
Â
Hamza
Hamza
Â
CYBER TERRORISM
CYBER TERRORISM
Â
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
Â
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Â
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
Â
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
Â
More from Scott Bou
đ College Argumentative Essay. 16 Easy Argumenta.pdf
đ College Argumentative Essay. 16 Easy Argumenta.pdf
Scott Bou
Â
Teagan Education Consulting Columbia College Chicago
Teagan Education Consulting Columbia College Chicago
Scott Bou
Â
Beginning Of Quotes In Essay Example. QuotesGr
Beginning Of Quotes In Essay Example. QuotesGr
Scott Bou
Â
WilsonFundati. Online assignment writing service.
WilsonFundati. Online assignment writing service.
Scott Bou
Â
IELTS Writing Task 2. Free Lessons For Improving Your
IELTS Writing Task 2. Free Lessons For Improving Your
Scott Bou
Â
Top Examples Of Personal Essays. Online assignment writing service.
Top Examples Of Personal Essays. Online assignment writing service.
Scott Bou
Â
How To Write In Third Person. How To Write In 3Rd Perso
How To Write In Third Person. How To Write In 3Rd Perso
Scott Bou
Â
History Essay Our University Essay. Online assignment writing service.
History Essay Our University Essay. Online assignment writing service.
Scott Bou
Â
Mla Format Double Spaced Essay - Ma. Online assignment writing service.
Mla Format Double Spaced Essay - Ma. Online assignment writing service.
Scott Bou
Â
Enneagram 4 Wing 3. Online assignment writing service.
Enneagram 4 Wing 3. Online assignment writing service.
Scott Bou
Â
First Grade Writng Paper Template With Picture Jour
First Grade Writng Paper Template With Picture Jour
Scott Bou
Â
Layout Of A Research Proposal. Research Propos
Layout Of A Research Proposal. Research Propos
Scott Bou
Â
Ms De 50 Ejemplos, Formularios Y Preguntas D
Ms De 50 Ejemplos, Formularios Y Preguntas D
Scott Bou
Â
Formal Proposal. Online assignment writing service.
Formal Proposal. Online assignment writing service.
Scott Bou
Â
How To Write A Note Card For A Research Paper Tips To Hel
How To Write A Note Card For A Research Paper Tips To Hel
Scott Bou
Â
10 Best Love Letter Templates Printable For Fr
10 Best Love Letter Templates Printable For Fr
Scott Bou
Â
Essay Help Australia For Students By Profe
Essay Help Australia For Students By Profe
Scott Bou
Â
Printable Writing Paper Writing Paper Printable, Fr
Printable Writing Paper Writing Paper Printable, Fr
Scott Bou
Â
Custom Research Paper Writing Service By Khan Jo
Custom Research Paper Writing Service By Khan Jo
Scott Bou
Â
An Abstract For A Research Paper. What To Put In An Ab
An Abstract For A Research Paper. What To Put In An Ab
Scott Bou
Â
More from Scott Bou
(20)
đ College Argumentative Essay. 16 Easy Argumenta.pdf
đ College Argumentative Essay. 16 Easy Argumenta.pdf
Â
Teagan Education Consulting Columbia College Chicago
Teagan Education Consulting Columbia College Chicago
Â
Beginning Of Quotes In Essay Example. QuotesGr
Beginning Of Quotes In Essay Example. QuotesGr
Â
WilsonFundati. Online assignment writing service.
WilsonFundati. Online assignment writing service.
Â
IELTS Writing Task 2. Free Lessons For Improving Your
IELTS Writing Task 2. Free Lessons For Improving Your
Â
Top Examples Of Personal Essays. Online assignment writing service.
Top Examples Of Personal Essays. Online assignment writing service.
Â
How To Write In Third Person. How To Write In 3Rd Perso
How To Write In Third Person. How To Write In 3Rd Perso
Â
History Essay Our University Essay. Online assignment writing service.
History Essay Our University Essay. Online assignment writing service.
Â
Mla Format Double Spaced Essay - Ma. Online assignment writing service.
Mla Format Double Spaced Essay - Ma. Online assignment writing service.
Â
Enneagram 4 Wing 3. Online assignment writing service.
Enneagram 4 Wing 3. Online assignment writing service.
Â
First Grade Writng Paper Template With Picture Jour
First Grade Writng Paper Template With Picture Jour
Â
Layout Of A Research Proposal. Research Propos
Layout Of A Research Proposal. Research Propos
Â
Ms De 50 Ejemplos, Formularios Y Preguntas D
Ms De 50 Ejemplos, Formularios Y Preguntas D
Â
Formal Proposal. Online assignment writing service.
Formal Proposal. Online assignment writing service.
Â
How To Write A Note Card For A Research Paper Tips To Hel
How To Write A Note Card For A Research Paper Tips To Hel
Â
10 Best Love Letter Templates Printable For Fr
10 Best Love Letter Templates Printable For Fr
Â
Essay Help Australia For Students By Profe
Essay Help Australia For Students By Profe
Â
Printable Writing Paper Writing Paper Printable, Fr
Printable Writing Paper Writing Paper Printable, Fr
Â
Custom Research Paper Writing Service By Khan Jo
Custom Research Paper Writing Service By Khan Jo
Â
An Abstract For A Research Paper. What To Put In An Ab
An Abstract For A Research Paper. What To Put In An Ab
Â
Recently uploaded
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
phamnguyenenglishnb
Â
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
Â
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
National Information Standards Organization (NISO)
Â
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Anupkumar Sharma
Â
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
Â
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
MakMakNepo
Â
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
nelietumpap1
Â
Model Call Girl in Bikash Puri Delhi reach out to us at đ9953056974đ
Model Call Girl in Bikash Puri Delhi reach out to us at đ9953056974đ
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Model Call Girl in Tilak Nagar Delhi reach out to us at đ9953056974đ
Model Call Girl in Tilak Nagar Delhi reach out to us at đ9953056974đ
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
SpandanaRallapalli
Â
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
iammrhaywood
Â
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
JhezDiaz1
Â
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
Celine George
Â
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Celine George
Â
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Dr. Mazin Mohamed alkathiri
Â
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
SamikshaHamane
Â
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
arsicmarija21
Â
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
NirmalaLoungPoorunde1
Â
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
InMediaRes1
Â
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
RaymartEstabillo3
Â
Recently uploaded
(20)
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
Â
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Â
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
Â
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Â
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Â
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
Â
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
Â
Model Call Girl in Bikash Puri Delhi reach out to us at đ9953056974đ
Model Call Girl in Bikash Puri Delhi reach out to us at đ9953056974đ
Â
Model Call Girl in Tilak Nagar Delhi reach out to us at đ9953056974đ
Model Call Girl in Tilak Nagar Delhi reach out to us at đ9953056974đ
Â
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
Â
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Â
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
Â
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
Â
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Â
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Â
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Â
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
Â
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Â
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Â
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Â
A COMPREHENSIVE STUDY ON ETHICAL HACKING
1.
[Begum* et al.,
5(8): August, 2016] ISSN: 2277-9655 ICâą Value: 3.00 Impact Factor: 4.116 http: // www.ijesrt.com © International Journal of Engineering Sciences & Research Technology [214] IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A COMPREHENSIVE STUDY ON ETHICAL HACKING Suriya Begum*, Sujeeth Kumar, Ashhar * Professor,Department of Computer Science and Engineering, New Horizon College of Engineering,Bangalore, India Student, Department of Computer Science and Engineering, New Horizon College of Engineering,Bangalore, India Student, Department of Computer Science and Engineering, Bangalore, India DOI: 10.5281/zenodo.59534 ABSTRACT Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System used in hacking , its pros and cons and a detail case study of J.P.Morgan. KEYWORDS: Computer Ethics, Ehical Hacking , Malware Ethics, Research Ethics; Malicious Hacker; Pornography. INTRODUCTION In todayâs busy world we are always required to be connected to each other, and this is achieved through internet. But care needs to be taken about what information we reveal to others on the net because those who intend on causing harm to you will use this information against you [3]. So it is important to protect oneself online from variety of threats online [3]. Hacking refers to gaining access to a computer to obtain information stored on it by means of password cracker software or any other technique to get data . This is done to either point out the loop holes in the security or to cause intentional sabotage of the computer [3]. They are the computer programmers who have knowledge of computer programming and have enough information on the systems they are about to hack [3]. Thus , a hacker whether he wants to sabotage the system or check its security will have to have exceptional knowledge of computers.. CONCEPT OF HACKING Hacking refers to gaining access to a computer to obtain information stored on it by means of password cracker software or any other technique to get data . This is done to either point out the loop holes in the security or to cause intentional sabotage of the computer [3].
2.
[Begum* et al.,
5(8): August, 2016] ISSN: 2277-9655 ICâą Value: 3.00 Impact Factor: 4.116 http: // www.ijesrt.com © International Journal of Engineering Sciences & Research Technology [215] HISTORY OF HACKING 1939: The âbombeâ became the worldâs first ethical hacking machine. It was used by the British to decipher encrypted German messages during WWII [8]. 1960: The Computer Penetration was first discussed by leading experts with the mention of deliberate tests by professionals. 1971 : The first âTiger-Teamâ was formed. USAF contracted James Anderson to test time-sharing systems. 1974: The US Air Force conducts one of the first ethical hacks to test the security of the Multics OS [8]. 1986: The US Computer Fraud and Abuse Act makes black and grey hat hacking a criminal offense. 1995: Dan Farmer & Wietse Venema released SATAN, an automated vulnerability scanner, which becomes a popular hacking tool. 1999: Software security goes mainstream with the release of Microsoft Windowâs 98. 2003: OWASP releases the first OWASP testing guide to teach best practices in penetration testing [8]. 2009: PTES is founded leading to an increase in ethical hacking jobs. They offer business and security service providers a common language and scope for performing penetration testing. 2014: Worldwide security spending reaches $71.1 billion. Security executives begin to use on demand penetration testing services for cost effective ethical hacking [8]. TRUTH ABOUT HACKERS They are the computer programmers who have knowledge of computer programming and have enough information on the systems they are about to hack [3]. Thus , a hacker whether he wants to sabotage the system or check its security will have to have exceptional knowledge of computers. CLASSIFICATION OF HACKERS Hackers are mainly classified into 3 types: a) White hat hackers: They are the also called Ethical Hackers who hack computers of corporate companies to check for any loop holes in their security [3]. They are paid for this job known as Penetrating Testing. b) Black hat hackers: They are the opposite of white hat hackers who donât take hacking jobs from companies but do it to cause harm to them. They sabotage the systems so as to obtain information about their target which includes bank information, personal details, phone numbers , etc [3]. c) Grey hat hackers: They are the hybrid of white hat and grey hat hackers [3]. Other types of Hackers are : d) Crackers: They are the college students who hack systems for personal use. e) Script-kiddie: They are the non technical people who know how to use professional hacking tools. VARIOUS OPERATING SYSTEM (OS) USED IN HACKING 1. Backtrack Linux: It is one of the first OS used for hacking purposes. It has been designed for hacking by Offensive Security Organization of Israel Hackers [3]. 2. Kali Linux: It is the most widely used OS across the world for hacking currently. This OS is the reborn version of Backtrack Linux as it contains much more advanced tools than Backtrack Linux [3]. DIFFERENT TECHNIQUES USED FOR HACKING There are many techniques which are used for Ethical Hacking .Here , elaboration of about 4 commonly used Hacking techniques has been discussed [5]. Phishing Hack : In this technique the attacker will want to obtain information about the people or a particular person who has sensitive information like credit card number, account password ,etc[4]. There are different types of Phishing: i. Clone phishing ii. Spear phishing iii. Phone phishing
3.
[Begum* et al.,
5(8): August, 2016] ISSN: 2277-9655 ICâą Value: 3.00 Impact Factor: 4.116 http: // www.ijesrt.com © International Journal of Engineering Sciences & Research Technology [216] iv. DNS-Based Phishing(Pharming) v. Man-in-the-middle attack There are different techniques of a Phishing Hack: 1) Email spoofing 2) Web spoofing 3) DNS Cache Poisoning 4) Malware FTP Brute Force Hack: In this technique , a hacker will use the Brute Force algorithm to find out a personâs account password on the FTP Client. The Brute Force algorithm is designed in such a way that it will try every combination of the password, until the correct password has been obtained. We usually can use FileZilla software to achieve this [1] . Denial of Service (DoS) : In this type of attack , a hacker attacks a target machine and makes sure that the system is unavailable for intended users for a short time or a particular period of time[7]. A Distributed Denial of Service (DDoS) is an advanced type of DoS in which the hacker attack a group of system used in business, shops, corporate ,etc. Symptoms of Denial of Service: a) An attempt on flooding network traffic to prevent legitimate network traffic. b) To disturb connections between 2 systems, thereby stopping access to a particular service being provided. c) Preventing a client or may be an employee of the company from accessing a particular service or system. d) To stop a service from being given to a particular person (like an employee) [7] . Types of DoS: 1. SYN flood attack 2. TCP Reset attack 3. ICMP attack 4. UDP storm attack 5. DNS request attack 6. CGI request attack 7. Mail bomb attack 8. ARP storm attack 9. Algorithmic complexity attack 10. Spam attack Malware : It refers to all the virus, trojans, bombs , etc., created by hackers to ensure that they can damage the target systems and collect required data and ensure that the target system will always have vulnerabilities in them[2]. Types of Malware: a) Smartphone malware b) Worms, viruses c) Spyware, keystroke loggers, information theft malware d) Botnet attacks and detection/tracking and defense e) Rootkit and virtualization technique PHASES OF PENETRATION TESTING 1. Reconnaissance: It refers to collecting of information about the target system, either by the attacker or by the white hats. This is done by a few techniques like Foot printing, WHOIS, Google hacking [3].
4.
[Begum* et al.,
5(8): August, 2016] ISSN: 2277-9655 ICâą Value: 3.00 Impact Factor: 4.116 http: // www.ijesrt.com © International Journal of Engineering Sciences & Research Technology [217] 2. Exploitation: It is the usage of loopholes in the target system to gain access to the system. This is done using a few techniques like network hacking here Ftp Anonymous issues is most prevalent so we can use Ftp Brute Force; Web Exploitation [3]. 3. Maintaining Access: This phase refers to having a remote connection established with the target system. This can be done using Backdoors, Rootkits. [8] 4. Post Exploitation: This phase is different for white hats and attackers. For white hats , they have to they have to give a penetration test report with 3 parts: a) Executive summary b) Detailed Report c) Raw output. But for attackers they have to cover their tracks and make sure that there is no knowledge of their attack on the target [8]. CASE STUDY J.P.Morganâs Data Breach : In this case study ,we will give some insights of how the Mega Bank J.P.Morgan got hacked : This event has happened in June 2014, when an employee of the company had his login credentials stolen as his system was infected with malware [6]. The employee tried to login to the corporate network through a VPN, and the hacker was able to obtain access to the internal network of the company. The hacker was able to get pass all the security measures present and gain full control of the network , as he obtained administrator privilege level and soon took over more than 90 servers of the company[6]. To avoid detection by the company the information was extracted slowly for several months without being noticed. The breach would have gone unnoticed had they not hacked one of the companyâs charity sites. The Hold Security, Inc. had discovered billions of usernames and passwords stolen, so they checked their companyâs corporate network and found that they too had been breached. Since , Hold Security, Inc. had discovered the hack in time so that the damage done could be minimized [6] .But the hackers had already stolen usernames, passwords, contact information 76 million individuals and 7 million small businesses. With the amount of data that had been stolen from J.P.Morgan could face future breaches as their vulnerabilities are very large[6] . PROS OF ETHICAL HACKING i. It help us to think like a criminal(black hat, grey hat). ii. Helps us to create secure systems less vulnerable to external attacks. iii. It gives us a chance of knowing the weak spots in the security of the systems [1,8] . CONS OF ETHICAL HACKING i. It only gives us a brief overview of what is happening. ii. Loss of sensitive information. iii. A thought of feeling secured without realizing an external attack already happening [1,8]. CONCLUSION From a practical standpoint the security problem will remain as long as manufacturers remain committed to current system architectures, produced without a requirement for security. As long as there is support for ad hoc and security pack-ages for these inadequate designs and as long as the illusory results of penetration teams are accepted as demonstrations of a computer system security, proper security will not be a reality. Regular auditing, vigilant intrusion detection, good system administration practice, and computer security awareness are all essential parts of an organizationâs security efforts. A single failure in any of these areas could very well expose an organization to cyber- vandalism, embarrassment, loss of revenue or mind share, or worse. Any new technology has its benefits and its risks. While ethical hackers can help clients better understand their security needs, it is up to the clients to keep their guards in place. In the future , more and more techniques will be discussed with its advantages and disadvantages. REFERENCES [1] Sonal Beniwal , Sneha , âHacking FTP Server Using Brute Force Algorithm â , International Journal of Computer Engineering and Applications, Volume 9, Issue 6, Part 1, June 2015 , ISSN 2321-3469 [2] Umer Asgher , Fahad Moazzam Dar , Ali Hamza , Abdul Moeed Paracha ,âAnalysis of Increasing Malwares and Cyber Crimes Using Economic Approach â , The International Journal of Soft Computing and Software
5.
[Begum* et al.,
5(8): August, 2016] ISSN: 2277-9655 ICâą Value: 3.00 Impact Factor: 4.116 http: // www.ijesrt.com © International Journal of Engineering Sciences & Research Technology [218] Engineering ,Vol. 3, No. 3, Special Issue: The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSEâ13], San Francisco State University, CA, U.S.A., March 2013 [3] Parag Pravin Shimpi , Prof Mrs Sangeeta Nagpure , â Penetration Testing: An Ethical Way of Hacking â , Global Journal For Research Analysis, Volume-4, Issue-4, April-2015 , ISSN No 2277 â 8160 [4] Dr. M. Nazreen Banu S. Munawara Banu , âA Comprehensive Study of Phishing Attacksâ, International Journal of Computer Science and Information Technologies, Vol. 4 (6) , 2013, 783-786 [5] Minakshi Bhardwaj and G.P. Singh, âTypes of Hacking Attack and their Counter Measure â, International Journal of Educational Planning & Administration. Volume 1, Number 1 ,2011, pp. 43-53 © Research India Publications [6] Allen Jeng , âMinimizing Damage From J.P. Morganâs Data Breachâ,GIAC (GSEC) Gold Certification ,Author: Allen Jeng, ajeng@adobe.com ,Advisor: Tim Proffitt ,Accepted: March 15th, 2015 ,Copyright SANS Institute [7] Shenam Chugh, Dr. Kamal Dhanda , âDenial of Service Attacks â, International Journal of Advanced Research in Computer Science and Software Engineering. Volume 5, Issue 8, August 2015 [8] http://www.slideshare.net/installCore/install-core-history-of-ethical-hacking-and-penetration-testing [9] Gurpreet K. Juneja ,â ETHICAL HACKING: A TECHNIQUE TO ENHANCE INFORMATION SECURITY â, International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 2, Issue 12, December 2013 [10]Sonal Beniwal, 2 Sneha, âEthical Hacking: A Security Technique â, International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 5, Issue 4, 2015 ISSN: 2277 [11]Murugavel, âSurvey on Ethical Hacking Process in Network Security â,International Journal of Engineering Sciences & Research Technology [836-839, [July, 2014] ISSN: 2277-9655 OTHER PUBLICATIONS 1. Suriya Begum , Dr. Prashanth C.S.R , âReview of Load Balancing in cloud Computingâ, International Journal of Computer Science Issues, ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 , Vol. 10, Issue 1 , No. 2 , January-2013 , pg. 343 â 352 . 2. Suriya Begum , Dr. Prashanth C.S.R , âInvestigational Study of 7 Effective Schemes of Load Balancing in cloud Computingâ ,International Journal of Computer Science Issues , ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 , Vol. 10, Issue 6 , No. 1 , November-2013, pg. 276 â 287. 3. Suriya Begum , Dr. Prashanth C.S.R , âMathematical Modeling of Joint Routing & Scheduling for an Effective Load Balancing in cloudâ, International Journal of Computer Application, (0975 â 8887) , Volume 104 â No.4, October-2014 , pg. 32 â 38 . 4. Suriya Begum , Dr. Prashanth C.S.R , âStochastic Based Load Balancing Mechanism for Non-Iterative Optimization of Traffic in Cloud â, IEEE International Conference , SSN Colg of Engg, Chennai, 23-25 March-2016, WiSPNET 2016. 5. Suriya Begum , Vasanthi , Dr. Prashanth C.S.R , âEnsuring Data Security in Cloud Computing From Single To Multi Cloud For Multi Share Usersâ ,National Level Technical Paper Presentation, MVJ CE , Bangalore, 4th -5th October ,FVCT-2012. 6. Suriya Begum , Archana , Dr. Prashanth C.S.R , âPerformance Analysis of Cloud Computing Centres using M=G=m=m+r Queuing Systemsâ, National Level Technical Paper Presentation, NHCE , Bangalore, 28th March,NCICT-2013. 7. Suriya Begum , Ayub Inamdar , âPriority Based Pre-Emptive Scheduling of Real Time Services Request with Task Migration for Cloud Computingâ, National Level Technical Paper Presentation , Akshaya IT Tumkur, 29th April Technika-2014 8. Suriya Begum , Asha C , Dr. Prashanth C.S.R , âA Novel Load Balancing Strategy for Effective Utilisation of Virtual Machines in Cloudâ, International Journal of Computer Science & Mobile Computing, ISSN : 2320-088X, Vol 4, Issue 6, June-2015, pg. 862-870. 9. Suriya Begum , Ananth Raju , Dr. Prashanth C.S.R , âResource Management By Virtual Machines Migration In Cloud Computingâ, International Journal of Computer Science & Mobile Computing, ISSN : 2320-088X, Vol 4, Issue 12, December-2015, pg. 307-312.
6.
[Begum* et al.,
5(8): August, 2016] ISSN: 2277-9655 ICâą Value: 3.00 Impact Factor: 4.116 http: // www.ijesrt.com © International Journal of Engineering Sciences & Research Technology [219] 10. Suriya Begum , Sachin , Ram Charan, Nikhit, Sai Prathap, âAnalysis of Various Load Balancing Techniques in Cloud Environmentâ ,International Journal of Computer Science & Mobile Computing, ISSN : 2320- 088X, Vol 5, Issue 2, Feb-2016 , pg . 248 -254. 11. Suriya Begum , Venugopal , âComparison Of Various Techniques In IoT For Healthcare Systemâ ,International Journal of Computer Science & Mobile Computing, ISSN : 2320-088X, Vol 5, Issue 3, March- 2016, pg. 59 â 66 . 12. Suriya Begum , Kavya , âAnalysis of Various Big Data Techniques For Securityâ ,International Journal of Computer Science & Mobile Computing, ISSN : 2320-088X, Vol 5, Issue 3, March-2016, pg. 54 â 58 . 13. Suriya Begum , Venugopal, â Analysis of Load Balancing Algorithms in Cloud Environmentâ, International Journal of Emerging Technology & Advanced Engineering, ISSN : 2250-2459, Vol 6, Issue 4, April-2016, pg. 151 â 154 . 14. Suriya Begum , Kavya , â A Study on Load Balancing techniques in Cloud Computing Environmentâ, International Journal of Emerging Technology & Advanced Engineering, ISSN : 2250-2459, Vol 6, Issue 5, May-2016, pg. 72 â 74 . 15. Suriya Begum , Kavya , Venugopal , âA Study on Load Balancing techniques in Cloud Computing Environmentâ, 3rd International Conference On Convergent Innovative Technologies, ,Cambridge IT, Bangalore . ISSN(Online) : 2319-6890, 20th May-2016,ICCIT-2016 . 16. Suriya Begum , Kavya , Venugopal , âA Study on Load Balancing techniques in Cloud Computing Environmentâ, International Journal of Engineering Research, ISSN(Online) : 2319-6890, ISSN(Print) : 2347-5013, Vol 5, Issue Special 4, May-2016, pg.904-909 . 17. Suriya Begum , Rohit Mulay , Ashhar ,âNear Field Communication: A Surveyâ, International Journal of Emerging Technology & Advanced Engineering, ISSN : 2250-2459, Vol 6, Issue 6, June-2016, pg. 92 â9 7
Download now