SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Engineering Sciences & Emerging Technologies, Jan 2015.
ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET
715
BASICS OF ETHICAL HACKING
Chenchu Lakshmi S1
, P I Basarkod2
1
M-Tech (DCN) Student, Reva institute of Technology and Management, Bangalore, India
2
Sr. Associate Prof. (ECE), Reva Institute of Technology and Management, Bangalore, India
ABSTRACT
We are living in security era, where we are securing all our belongings under different modes of lock but it’s
different in the case of system security. We are carelessly leaving our datas and softwares unlocked. The state of
security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical
Hacking which attempts to increase security protection by identifying and patching known security
vulnerabilities on systems owned by other parties. As public and private organizations migrate more of their
critical functions to the Internet, criminals have more opportunity and incentive to gain access to sensitive
information through the Web application. So, Ethical hacking is an assessment to test and check an information
technology environment for possible weak links and vulnerabilities. Ethical hacking describes the process of
hacking a network in an ethical way, therefore with good intentions. This paper describes what ethical hacking
is, what it can do, an ethical hacking methodology as well as some tools which can be used for an ethical hack.
KEYWORDS: Hacking, Hacker, Ethical Hacking, Vulnerabilities, Hacker, Cracker, Security, Tools
I. INTRODUCTION
The vast growth of Internet has brought many good things like electronic commerce, email, easy
access to vast stores of reference material etc. One of the more effective ways of testing network
security is penetration testing or ethical hacking. Activities focus on the identification and exploitation
of security vulnerabilities, and subsequent implementation of corrective measures (Using an Ethical
Hacking Technique). Organizations are increasingly evaluating the success or failure of their current
security measures through then use of ethical hacking processes. As, with most technological
advances, there is also other side: criminal hackers who will secretly steal the organization’s
information and transmit it to the open internet. These types of hackers are called black hat hackers.
So, to overcome from these major issues, another category of hackers came into existence and these
hackers are termed as ethical hackers or white hat hackers. So, this paper describes ethical hackers,
their skills and how they go about helping their customers. Ethical hackers perform the hacks as
security tests for their systems. This type of hacking is always legal and trustworthy. In other terms
ethical hacking is the testing of resources for the betterment of technology and is focussed on securing
and protecting IP systems. Ethical hacking is a way of doing a security assessment. Like all other
assessments an ethical hack is a random sample and passing an ethical hack doesn’t mean there are no
security issues.
What is Ethical Hacking?
Ethical hacking provides a way to determine the security of an information technology environment –
at least from a technical point of view. As the name ethical hacking already tells, the idea has
something to do with hacking. But what does “hacking” mean? “The word hacking has two
definitions. The first definition refers to the hobby/profession of working with computers. The second
definition refers to breaking into computer systems. While the first definition is older and is still used
by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is
International Journal of Engineering Sciences & Emerging Technologies, Jan 2015.
ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET
716
much more commonly used.” In the context of “ethical hacking”, hacking refers to the second
definition – breaking into computer systems. It can be assumed that hacking is illegal, as breaking into
a house would be. At this point, “ethical” comes into play. Ethical has a very positive touch and
describes something noble which leads us to the following definition of ethical hacking: Ethical
hacking describes the process of attacking and penetrating computer systems and networks to discover
and point out potential security weaknesses for a client which is responsible for the attacked
information technology environment. An ethical hack’s results is a detailed report of the findings as
well as a testimony that a hacker with a certain amount of time and skills is or isn’t able to
successfully attack a system or get access to certain information. Ethical hacking can be categorized
as a security assessment, a kind of training, a test for the security of an information technology
environment. An ethical hack shows the risks an information technology environment is facing and
actions can be taken to reduce certain risks or to accept them. We can easily say that Ethical hacking
does perfectly fit into the security life cycle shown in the below figure.
Fig. 1 Security life cycle
II. CATEGORIES OF HACKERS
White Hats
Ethical hacker is also known as White hat hacker, or white hat, they use programming skills to
determine the vulnerabilities in computer systems.
Black Hats
Non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other
purposes. Ethical hacker introspect the weakness in computer security, points them out and may
suggest changes to system to secure the information.
Grey Hats
Gray Hats hack for different reasons either ethically or unethically depending on the situation and
circumstances at hand(Ethical Hacking: Student Courseware).
III. PENETRATION TESTING
Penetration testing also known as intrusion testing or red teaming is the method of examining the
weakness and vulnerabilities of Computer and network security. Penetration testing helps to measure
the effectiveness of system security or ineffectiveness of the system security.
Need of Penetration Testing: The main purpose of penetration testing is to identify the security
weakness under controlled circumstances so that the security flaws can be eliminated before hackers
exploit the system. Ethical hackers use their skills and apply penetration testing to discover the
vulnerability Assessment, give importance to high sensitive data. Penetration testing may be done
from business perspective to safeguard the organization against failure through preventing financial
loss, as well as operational perspective to identify the risk and vulnerabilities.
Types of Penetration Test: Generally there are two type of penetration testing namely
1) Black Box Test
2) White Box Test
International Journal of Engineering Sciences & Emerging Technologies, Jan 2015.
ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET
717
The type of penetration testing depends upon the situation of an organization wants to test, whether
the scope is to simulate an attack by an insider (employee, network admin/ system admin, etc) or
external source. The difference between the two is the amount of information provided to the
penetration tester about the system is tested. In black box penetration testing is closely stimulated to
that of an external attacker, giving little info or no knowledge about the systems to be tested. The
penetration testers gather as much as information about the target system as possible to perform the
test. In white box penetration testing the tester generally provided with detailed information about the
network to be tested include the IP address.
Merits of Penetration Testing: Penetration testing are effective for many reasons
(1) avoid cost of network
(2) preserve the corporate image and customer loyalty
(3) meet the requirements
(4) manage vulnerabilities.
Penetration testing provides detailed information about actual, exploitable security threats. By doing
penetration test we can easily identify the vulnerabilities are most critical as well as least significant.
Penetration test benefits the organization by performing security patches and security resource more
precisely to safeguard the information.
IV. WORKING OF AN ETHICAL HACKER
The working of an ethical hacker involves the under mentioned steps:
1) Obeying the Ethical Hacking Commandments: Every Ethical Hacker must follow few basic
principles. If he does not follow, bad things can happen. Most of the time these principles get
ignored or forgotten when planning or executing ethical hacking tests. The results are even
very dangerous.
2) Working ethically: The word ethical can be defined as working with high professional morals
and principles. Whether you’re performing ethical hacking tests against your own systems or
for someone who has hired you, everything you do as an ethical Hacker must be approved
and must support the company’s goals. No hidden agendas are allowed. Trustworthiness is
the ultimate objective. The misuse of information is absolutely not allowed.
3) Respecting Privacy: Treat the information you gather with complete respect. All information
you obtain during your testing from Web application log files to clear-text passwords —
must be kept private.
4) Not crashing your systems: One of the biggest mistakes is when people try to hack their own
systems; they come up with crashing their systems. The main reason for this is poor
planning. These testers have not read the documentation or misunderstand the usage and
power of the security tools and techniques. You can easily create miserable conditions on
your systems when testing. Running too many tests too quickly on a system causes many
system lockups. Many security assessment tools can control how many tests are performed
on a system at the same time. These tools are especially handy if you need to run the tests on
production systems during regular business hours.
5) Executing the plan: In Ethical hacking, Time and patience are important. Be careful when
you’re performing your ethical hacking tests.
V. ETHICAL HACKING METHODOLOGY
An ethical hacking methodology is quite similar to a hacking methodology as there are more or less
the same goals. Anyhow, some differences exist. An ethical hacker doesn’t need to take that much
care in hiding his traces and tracks. He can chose a more aggressive way and doesn’t need to bother
with slowing down portscans (to avoid detection) or evading intrusion detection systems – at least
most of the time unless it is specially desired by the client. Mostly, an ethical hacker just hasn’t the
time to be that careful in blurring his traces and tracks unless the customer pays for. Nevertheless, a
lot of similarities can be found to a hacking methodology. An ethical hacking methodology overview
can be seen in figure 2. A similar setup could be used by a hacker for his attacks. The ethical hacking
methodology described is based on eight possible phases where interactions between the phases are
International Journal of Engineering Sciences & Emerging Technologies, Jan 2015.
ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET
718
possible, even required as hacking is an iterative process; going back to an earlier phase is absolutely
possible (and needed).
Figure 2: Ethical Hacking Methodology
1. Reconnaissance: It refers to gather as more information as we can about target in prior to
perform an attack. It can be further classified into Active and Passive. Former involves
information gathering with direct interaction like social engineering and the later without any
direct interaction by searching news release or public records.
2. Scanning: It refers to scan for all the open as well as closed ports and even for the known
vulnerabilities on the target machine.
3. Gaining Control: It can be gained at OS level, system level or even network level. From
normal access hacker can even proceed with privilege escalation. It often includes password
cracking, buffer overflows, DoS attack etc.
4. Maintaining Access: It is where hacker strives to retain its control over target with backdoors,
root kits or Trojans. Compromised machines can even be used as Bots and Zombies for
further attacks.
5. Covering Tracks : It is also known as Daisy Chaining. To avoid being exposed or caught, a
good hacker will leave no impressions of his presence. So he attempts to overwrite the system
and application logs.
VI. ETHICAL HACKING PROCESS
The Ethical hacking process needs to be planned in advance. All technical, management and
strategical issues must be considered. Planning is important for any amount of testing – from a simple
password test to all out penetration test on a web application. Backup off data must be ensured,
otherwise the testing may be called off unexpectedly if someone claims they never authorises for the
tests. So, a well defined scope involves the following in formation:
1. Specific systems to be tested.
2. Risks that are involved.
3. Preparing schedule to carry test and overall timeline.
4. Gather and explore knowledge of the systems we have before testing.
5. What is done when a major vulnerability is discovered?
6. The specific deliverables- this includes security assessment reports and a higher level report
outlining the general vulnerabilities to be addressed, along with counter measures that should
be implemented when selecting systems to test, start with the most critical or vulnerable
systems.
International Journal of Engineering Sciences & Emerging Technologies, Jan 2015.
ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET
719
VII. HACKING TOOLS
There are various characteristics for the use of tools for ethical hacking which are as follows:
1. Adequate documentation
2. Detailed reports on the discovered vulnerabilities, including how they can be fixed
3. Updates and support when needed
4. High level reports that can be presented to managers .
The list and description of various tools used in the ethical hacking process are as follows:
Scanning tools: The Scanning tools are quite helpful in the ethical hacking process. In technical detail,
a scanner sends a message requesting to open a connection with a computer on a particular port. (A
port is an interface where different layers of software exchanges information).
Port Scanners:
 Nmap
 Superscan
 Angry IP Scanner
 Nikto
 Unicornscan
 Autoscan
Packet Sniffers: They allow you to capture and visualise the traffic that is coming on your website.
 Wireshark
 TCPdump
 Ethercap
 Dsniff
 EtherApe
Vulnerability Exploitation: These are the tools you would use in order to gain access to various
places.
 Metasploit
 Sqlmap
 Sqlninja
 Social Engineer Toolkit
 Netsparker
 BeEF
 Dradis
Vulnerability Scanners: These are designed to access a computer or network’s vulnerability to attacks.
The functionaility of these tools varies from one to the other, but they all present a detailed analysis of
how vulnerable your system is.
 Nessus
 OpenVAS
 Nipper
 Retina
 QualysGuard
 Nexpose
Hacking Operating System: These are OS that have been designed specifically for hackers.
 Backtrack5r3
 Kalilinux
 SE Linux
 Knoppix
 Backbox linux
 Pentoo
 Matriux Krypton
 NodeZero
 Blackbuntu
 CAINE
 DEFT
 Helix
International Journal of Engineering Sciences & Emerging Technologies, Jan 2015.
ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET
720
Intrusion Detection Systems: These tools are one of the most important part of any security
arrangement. They allow you to detect those threats that are potentially dangerous for your system.
 Snort
 NetCap
VIII. CONCLUSION
Ethical hacking seems to be a new buzz word although the techniques and ideas of testing security by
attacking an installation aren’t new at all. But, with the present poor security on the internet, ethical
hacking may be the most effective way to plug security holes and prevent intrusions. On the other
hand ethical hacking tools have also been notorious tools for crackers. So, at present the tactical
objective is to stay one step ahead of the crackers. Ethical Hacking is a tool, which if properly
utilized, can prove useful for understanding the weaknesses of a network and how they might be
exploited. After all, ethical hacking will play a certain role in the security assessment offerings and
certainly has earned its place among other security assessments. In conclusion, it must be said that the
ethical hacker is an educator who seeks to enlighten not only the customer, but also the security
industry as a whole.
REFERENCES
[1]. Gurpreet K. Juneja, “A Technique to Enhance Information Security”, dec 2013.
[2]. Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones, “An Overview of
Penetration Testing”, Volume3.no.6, Nov 2011
[3]. Monika Pangaria1, Vivek Shrivastava2,” Need of Ethical Hacking in Online World”, Volume.2. Issue
4.Apr 2014
[4]. K.BalaChowdappa,S. Subbulakshmi,P.N.V Pavan Kumar, Ethical Hacking Techniques with
Penetration Testing, Volume 5(3).2014
[5]. Regina D. Hartley, Ethical Hacking: Teaching Students to Hack, East Carolina University.
[6]. Monika Pangaria, Vivek Shrivastava, “Need of Ethical Hacking in Online World”, International
Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064, Volume 2 Issue 4, April
2013.
[7]. Rashmi Hegde, “Biometrics Authentication Technique with Kerberos for Email Login”, International
Journal of Advances in Engineering & Technology, Vol. 7, Issue 6, pp. 1735-1744, Jan., 2015.
[8]. Amitesh Kumar Gupta, Asish Srivastava, Tinesh Kumar Goyal, Piyush Saxena, “ETHICAL
HACKING: An Approach towards Penetration Testing “,International Journal of Modern
Communication Technologies & Research (IJMCTR) ISSN: 2321-0850, Volume-2, Issue-5, May
2014
[9]. Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram, “Ethical Hacking in Linux
Environment”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-
9622 , Vol. 3, Issue 1, January -February 2013, pp.1854-1860

More Related Content

What's hot

To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...Nishant Mehta
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?Rapid7
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatAndrew Case
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AIObject Automation
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)Wail Hassan
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data BreachKunal Sharma
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)Wail Hassan
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 
An overview of network penetration testing
An overview of network penetration testingAn overview of network penetration testing
An overview of network penetration testingeSAT Publishing House
 

What's hot (20)

AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
An overview of network penetration testing
An overview of network penetration testingAn overview of network penetration testing
An overview of network penetration testing
 

Viewers also liked

Call for Engineering paper ijeset
Call for Engineering paper ijesetCall for Engineering paper ijeset
Call for Engineering paper ijesetDrm Kapoor
 
Call for papers journal
Call for papers  journalCall for papers  journal
Call for papers journalDrm Kapoor
 
Tävlingsmaskinen – Allt sker på Facebook
Tävlingsmaskinen – Allt sker på FacebookTävlingsmaskinen – Allt sker på Facebook
Tävlingsmaskinen – Allt sker på FacebookYou Us and Them
 
Ijeset call for paper journal
Ijeset call for paper journalIjeset call for paper journal
Ijeset call for paper journalDrm Kapoor
 
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEWGRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEWDrm Kapoor
 
Call for engineering papers
Call for engineering papersCall for engineering papers
Call for engineering papersDrm Kapoor
 
Call for paper ijeset
Call for paper ijesetCall for paper ijeset
Call for paper ijesetDrm Kapoor
 
Call for paper ijeset
Call for paper ijesetCall for paper ijeset
Call for paper ijesetDrm Kapoor
 
Call for paper ijeset 2015
Call for paper ijeset 2015Call for paper ijeset 2015
Call for paper ijeset 2015Drm Kapoor
 
KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...
KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...
KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...Drm Kapoor
 
Reggae by santiago vasquez 11 c
Reggae by santiago vasquez 11 cReggae by santiago vasquez 11 c
Reggae by santiago vasquez 11 cSantiago VasQuez
 
Call for papers journal
Call for papers journalCall for papers journal
Call for papers journalDrm Kapoor
 
Cfp journal ijeset
Cfp journal ijesetCfp journal ijeset
Cfp journal ijesetDrm Kapoor
 

Viewers also liked (15)

Call for Engineering paper ijeset
Call for Engineering paper ijesetCall for Engineering paper ijeset
Call for Engineering paper ijeset
 
Call for papers journal
Call for papers  journalCall for papers  journal
Call for papers journal
 
Tävlingsmaskinen – Allt sker på Facebook
Tävlingsmaskinen – Allt sker på FacebookTävlingsmaskinen – Allt sker på Facebook
Tävlingsmaskinen – Allt sker på Facebook
 
Ijeset call for paper journal
Ijeset call for paper journalIjeset call for paper journal
Ijeset call for paper journal
 
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEWGRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
 
lich hoc he
lich hoc helich hoc he
lich hoc he
 
Call for engineering papers
Call for engineering papersCall for engineering papers
Call for engineering papers
 
Call for paper ijeset
Call for paper ijesetCall for paper ijeset
Call for paper ijeset
 
Call for paper ijeset
Call for paper ijesetCall for paper ijeset
Call for paper ijeset
 
Call for paper ijeset 2015
Call for paper ijeset 2015Call for paper ijeset 2015
Call for paper ijeset 2015
 
KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...
KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...
KINETICS, EQUILIBRIUM AND THERMODYNAMICS STUDIES ON BIOSORPTION OF HEAVY META...
 
Anime x
Anime xAnime x
Anime x
 
Reggae by santiago vasquez 11 c
Reggae by santiago vasquez 11 cReggae by santiago vasquez 11 c
Reggae by santiago vasquez 11 c
 
Call for papers journal
Call for papers journalCall for papers journal
Call for papers journal
 
Cfp journal ijeset
Cfp journal ijesetCfp journal ijeset
Cfp journal ijeset
 

Similar to BASICS OF ETHICAL HACKING

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-studyhomeworkping4
 
Breaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdfBreaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdfCetpa Infotech
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfMithunJV
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docxasharshaikh8
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 

Similar to BASICS OF ETHICAL HACKING (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
Breaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdfBreaking the Code The Art of Ethical Hacking.pdf
Breaking the Code The Art of Ethical Hacking.pdf
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

BASICS OF ETHICAL HACKING

  • 1. International Journal of Engineering Sciences & Emerging Technologies, Jan 2015. ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET 715 BASICS OF ETHICAL HACKING Chenchu Lakshmi S1 , P I Basarkod2 1 M-Tech (DCN) Student, Reva institute of Technology and Management, Bangalore, India 2 Sr. Associate Prof. (ECE), Reva Institute of Technology and Management, Bangalore, India ABSTRACT We are living in security era, where we are securing all our belongings under different modes of lock but it’s different in the case of system security. We are carelessly leaving our datas and softwares unlocked. The state of security on the internet is bad and getting worse. One reaction to this state of affairs is termed as Ethical Hacking which attempts to increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. As public and private organizations migrate more of their critical functions to the Internet, criminals have more opportunity and incentive to gain access to sensitive information through the Web application. So, Ethical hacking is an assessment to test and check an information technology environment for possible weak links and vulnerabilities. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions. This paper describes what ethical hacking is, what it can do, an ethical hacking methodology as well as some tools which can be used for an ethical hack. KEYWORDS: Hacking, Hacker, Ethical Hacking, Vulnerabilities, Hacker, Cracker, Security, Tools I. INTRODUCTION The vast growth of Internet has brought many good things like electronic commerce, email, easy access to vast stores of reference material etc. One of the more effective ways of testing network security is penetration testing or ethical hacking. Activities focus on the identification and exploitation of security vulnerabilities, and subsequent implementation of corrective measures (Using an Ethical Hacking Technique). Organizations are increasingly evaluating the success or failure of their current security measures through then use of ethical hacking processes. As, with most technological advances, there is also other side: criminal hackers who will secretly steal the organization’s information and transmit it to the open internet. These types of hackers are called black hat hackers. So, to overcome from these major issues, another category of hackers came into existence and these hackers are termed as ethical hackers or white hat hackers. So, this paper describes ethical hackers, their skills and how they go about helping their customers. Ethical hackers perform the hacks as security tests for their systems. This type of hacking is always legal and trustworthy. In other terms ethical hacking is the testing of resources for the betterment of technology and is focussed on securing and protecting IP systems. Ethical hacking is a way of doing a security assessment. Like all other assessments an ethical hack is a random sample and passing an ethical hack doesn’t mean there are no security issues. What is Ethical Hacking? Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean? “The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is
  • 2. International Journal of Engineering Sciences & Emerging Technologies, Jan 2015. ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET 716 much more commonly used.” In the context of “ethical hacking”, hacking refers to the second definition – breaking into computer systems. It can be assumed that hacking is illegal, as breaking into a house would be. At this point, “ethical” comes into play. Ethical has a very positive touch and describes something noble which leads us to the following definition of ethical hacking: Ethical hacking describes the process of attacking and penetrating computer systems and networks to discover and point out potential security weaknesses for a client which is responsible for the attacked information technology environment. An ethical hack’s results is a detailed report of the findings as well as a testimony that a hacker with a certain amount of time and skills is or isn’t able to successfully attack a system or get access to certain information. Ethical hacking can be categorized as a security assessment, a kind of training, a test for the security of an information technology environment. An ethical hack shows the risks an information technology environment is facing and actions can be taken to reduce certain risks or to accept them. We can easily say that Ethical hacking does perfectly fit into the security life cycle shown in the below figure. Fig. 1 Security life cycle II. CATEGORIES OF HACKERS White Hats Ethical hacker is also known as White hat hacker, or white hat, they use programming skills to determine the vulnerabilities in computer systems. Black Hats Non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other purposes. Ethical hacker introspect the weakness in computer security, points them out and may suggest changes to system to secure the information. Grey Hats Gray Hats hack for different reasons either ethically or unethically depending on the situation and circumstances at hand(Ethical Hacking: Student Courseware). III. PENETRATION TESTING Penetration testing also known as intrusion testing or red teaming is the method of examining the weakness and vulnerabilities of Computer and network security. Penetration testing helps to measure the effectiveness of system security or ineffectiveness of the system security. Need of Penetration Testing: The main purpose of penetration testing is to identify the security weakness under controlled circumstances so that the security flaws can be eliminated before hackers exploit the system. Ethical hackers use their skills and apply penetration testing to discover the vulnerability Assessment, give importance to high sensitive data. Penetration testing may be done from business perspective to safeguard the organization against failure through preventing financial loss, as well as operational perspective to identify the risk and vulnerabilities. Types of Penetration Test: Generally there are two type of penetration testing namely 1) Black Box Test 2) White Box Test
  • 3. International Journal of Engineering Sciences & Emerging Technologies, Jan 2015. ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET 717 The type of penetration testing depends upon the situation of an organization wants to test, whether the scope is to simulate an attack by an insider (employee, network admin/ system admin, etc) or external source. The difference between the two is the amount of information provided to the penetration tester about the system is tested. In black box penetration testing is closely stimulated to that of an external attacker, giving little info or no knowledge about the systems to be tested. The penetration testers gather as much as information about the target system as possible to perform the test. In white box penetration testing the tester generally provided with detailed information about the network to be tested include the IP address. Merits of Penetration Testing: Penetration testing are effective for many reasons (1) avoid cost of network (2) preserve the corporate image and customer loyalty (3) meet the requirements (4) manage vulnerabilities. Penetration testing provides detailed information about actual, exploitable security threats. By doing penetration test we can easily identify the vulnerabilities are most critical as well as least significant. Penetration test benefits the organization by performing security patches and security resource more precisely to safeguard the information. IV. WORKING OF AN ETHICAL HACKER The working of an ethical hacker involves the under mentioned steps: 1) Obeying the Ethical Hacking Commandments: Every Ethical Hacker must follow few basic principles. If he does not follow, bad things can happen. Most of the time these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even very dangerous. 2) Working ethically: The word ethical can be defined as working with high professional morals and principles. Whether you’re performing ethical hacking tests against your own systems or for someone who has hired you, everything you do as an ethical Hacker must be approved and must support the company’s goals. No hidden agendas are allowed. Trustworthiness is the ultimate objective. The misuse of information is absolutely not allowed. 3) Respecting Privacy: Treat the information you gather with complete respect. All information you obtain during your testing from Web application log files to clear-text passwords — must be kept private. 4) Not crashing your systems: One of the biggest mistakes is when people try to hack their own systems; they come up with crashing their systems. The main reason for this is poor planning. These testers have not read the documentation or misunderstand the usage and power of the security tools and techniques. You can easily create miserable conditions on your systems when testing. Running too many tests too quickly on a system causes many system lockups. Many security assessment tools can control how many tests are performed on a system at the same time. These tools are especially handy if you need to run the tests on production systems during regular business hours. 5) Executing the plan: In Ethical hacking, Time and patience are important. Be careful when you’re performing your ethical hacking tests. V. ETHICAL HACKING METHODOLOGY An ethical hacking methodology is quite similar to a hacking methodology as there are more or less the same goals. Anyhow, some differences exist. An ethical hacker doesn’t need to take that much care in hiding his traces and tracks. He can chose a more aggressive way and doesn’t need to bother with slowing down portscans (to avoid detection) or evading intrusion detection systems – at least most of the time unless it is specially desired by the client. Mostly, an ethical hacker just hasn’t the time to be that careful in blurring his traces and tracks unless the customer pays for. Nevertheless, a lot of similarities can be found to a hacking methodology. An ethical hacking methodology overview can be seen in figure 2. A similar setup could be used by a hacker for his attacks. The ethical hacking methodology described is based on eight possible phases where interactions between the phases are
  • 4. International Journal of Engineering Sciences & Emerging Technologies, Jan 2015. ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET 718 possible, even required as hacking is an iterative process; going back to an earlier phase is absolutely possible (and needed). Figure 2: Ethical Hacking Methodology 1. Reconnaissance: It refers to gather as more information as we can about target in prior to perform an attack. It can be further classified into Active and Passive. Former involves information gathering with direct interaction like social engineering and the later without any direct interaction by searching news release or public records. 2. Scanning: It refers to scan for all the open as well as closed ports and even for the known vulnerabilities on the target machine. 3. Gaining Control: It can be gained at OS level, system level or even network level. From normal access hacker can even proceed with privilege escalation. It often includes password cracking, buffer overflows, DoS attack etc. 4. Maintaining Access: It is where hacker strives to retain its control over target with backdoors, root kits or Trojans. Compromised machines can even be used as Bots and Zombies for further attacks. 5. Covering Tracks : It is also known as Daisy Chaining. To avoid being exposed or caught, a good hacker will leave no impressions of his presence. So he attempts to overwrite the system and application logs. VI. ETHICAL HACKING PROCESS The Ethical hacking process needs to be planned in advance. All technical, management and strategical issues must be considered. Planning is important for any amount of testing – from a simple password test to all out penetration test on a web application. Backup off data must be ensured, otherwise the testing may be called off unexpectedly if someone claims they never authorises for the tests. So, a well defined scope involves the following in formation: 1. Specific systems to be tested. 2. Risks that are involved. 3. Preparing schedule to carry test and overall timeline. 4. Gather and explore knowledge of the systems we have before testing. 5. What is done when a major vulnerability is discovered? 6. The specific deliverables- this includes security assessment reports and a higher level report outlining the general vulnerabilities to be addressed, along with counter measures that should be implemented when selecting systems to test, start with the most critical or vulnerable systems.
  • 5. International Journal of Engineering Sciences & Emerging Technologies, Jan 2015. ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET 719 VII. HACKING TOOLS There are various characteristics for the use of tools for ethical hacking which are as follows: 1. Adequate documentation 2. Detailed reports on the discovered vulnerabilities, including how they can be fixed 3. Updates and support when needed 4. High level reports that can be presented to managers . The list and description of various tools used in the ethical hacking process are as follows: Scanning tools: The Scanning tools are quite helpful in the ethical hacking process. In technical detail, a scanner sends a message requesting to open a connection with a computer on a particular port. (A port is an interface where different layers of software exchanges information). Port Scanners:  Nmap  Superscan  Angry IP Scanner  Nikto  Unicornscan  Autoscan Packet Sniffers: They allow you to capture and visualise the traffic that is coming on your website.  Wireshark  TCPdump  Ethercap  Dsniff  EtherApe Vulnerability Exploitation: These are the tools you would use in order to gain access to various places.  Metasploit  Sqlmap  Sqlninja  Social Engineer Toolkit  Netsparker  BeEF  Dradis Vulnerability Scanners: These are designed to access a computer or network’s vulnerability to attacks. The functionaility of these tools varies from one to the other, but they all present a detailed analysis of how vulnerable your system is.  Nessus  OpenVAS  Nipper  Retina  QualysGuard  Nexpose Hacking Operating System: These are OS that have been designed specifically for hackers.  Backtrack5r3  Kalilinux  SE Linux  Knoppix  Backbox linux  Pentoo  Matriux Krypton  NodeZero  Blackbuntu  CAINE  DEFT  Helix
  • 6. International Journal of Engineering Sciences & Emerging Technologies, Jan 2015. ISSN: 22316604 Volume 7, Issue 4, pp: 715-720 ©IJESET 720 Intrusion Detection Systems: These tools are one of the most important part of any security arrangement. They allow you to detect those threats that are potentially dangerous for your system.  Snort  NetCap VIII. CONCLUSION Ethical hacking seems to be a new buzz word although the techniques and ideas of testing security by attacking an installation aren’t new at all. But, with the present poor security on the internet, ethical hacking may be the most effective way to plug security holes and prevent intrusions. On the other hand ethical hacking tools have also been notorious tools for crackers. So, at present the tactical objective is to stay one step ahead of the crackers. Ethical Hacking is a tool, which if properly utilized, can prove useful for understanding the weaknesses of a network and how they might be exploited. After all, ethical hacking will play a certain role in the security assessment offerings and certainly has earned its place among other security assessments. In conclusion, it must be said that the ethical hacker is an educator who seeks to enlighten not only the customer, but also the security industry as a whole. REFERENCES [1]. Gurpreet K. Juneja, “A Technique to Enhance Information Security”, dec 2013. [2]. Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones, “An Overview of Penetration Testing”, Volume3.no.6, Nov 2011 [3]. Monika Pangaria1, Vivek Shrivastava2,” Need of Ethical Hacking in Online World”, Volume.2. Issue 4.Apr 2014 [4]. K.BalaChowdappa,S. Subbulakshmi,P.N.V Pavan Kumar, Ethical Hacking Techniques with Penetration Testing, Volume 5(3).2014 [5]. Regina D. Hartley, Ethical Hacking: Teaching Students to Hack, East Carolina University. [6]. Monika Pangaria, Vivek Shrivastava, “Need of Ethical Hacking in Online World”, International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064, Volume 2 Issue 4, April 2013. [7]. Rashmi Hegde, “Biometrics Authentication Technique with Kerberos for Email Login”, International Journal of Advances in Engineering & Technology, Vol. 7, Issue 6, pp. 1735-1744, Jan., 2015. [8]. Amitesh Kumar Gupta, Asish Srivastava, Tinesh Kumar Goyal, Piyush Saxena, “ETHICAL HACKING: An Approach towards Penetration Testing “,International Journal of Modern Communication Technologies & Research (IJMCTR) ISSN: 2321-0850, Volume-2, Issue-5, May 2014 [9]. Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram, “Ethical Hacking in Linux Environment”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248- 9622 , Vol. 3, Issue 1, January -February 2013, pp.1854-1860