4,57 €
About the book:
This help book contains mainly non-copyright matter which is solely and exclusively larger public interest . We acknowledge the copyright of the Original Author and are grateful for their historical contribution towards educational awareness. Ethical Hacking - Overview - Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. Learn how to become an elite ethical hacker and easily hack networks, computer systems, web apps and so much ... Cybersecurity & Ethical Hacking
About the author:
This help book Ethical Hacking - Overview - Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 85
Learnethicalhacking
AHelpbookofethicalhacking
BY
SATISHJHA
ISBN
9789354389009
©
SATISH
JHA
2020
Published
in
India
2020
by
Pencil
A
brand
of
One
Point
Six
Technologies
Pvt.
Ltd.
123,
Building
J2,
Shram
Seva
Premises,
Wadala
Truck
Terminal,
Wadala
(E)
Mumbai
400037,
Maharashtra,
INDIA
E
W
www.thepencilapp.com
All
rights
reserved
worldwide
No
part
of
this
publication
may
be
reproduced,
stored
in
or
introduced
into
a
retrieval
system,
or
transmitted,
in
any
form,
or
by
any
means
(electronic,
mechanical,
photocopying,
recording
or
otherwise),
without
the
prior
written
permission
of
the
Publisher.
Any
person
who
commits
an
unauthorized
act
in
relation
to
this
publication
can
be
liable
to
criminal
prosecution
and
civil
claims
for
damages.
DISCLAIMER:Thisisaworkoffiction.Names,characters,places,eventsandincidentsaretheproductsoftheauthor'simagination.TheopinionsexpressedinthisbookdonotseektoreflecttheviewsofthePublisher.
This
help
book
Ethical
Hacking
-
Overview
-
Hacking
has
been
a
part
of
computing
for
almost
five
decades
and
it
is
a
very
broad
discipline,
which
covers
a
wide
range
of
topics.
EthicalHacking-Home
Hackinghasbeenapartofcomputingforalmostfivedecadesanditisaverybroaddiscipline,whichcoversawiderangeoftopics.Thefirstknowneventofhackinghadtakenplacein1960atMITandatthesametime,theterm"Hacker"wasoriginated.Inthistutorial,wewilltakeyouthroughthevariousconceptsofEthicalHackingandexplainhowyoucanusetheminareal-timeenvironment.
ThistutorialhasbeenpreparedforprofessionalsaspiringtolearnthebasicsofEthicalHackingandmakeacareerasanethicalhacker.
Beforeproceedingwiththistutorial,youshouldhaveagoodgraspoverallthefundamentalconceptsofacomputerandhowitoperatesinanetworkedenvironment.EthicalHacking-Overview
Hackinghasbeenapartofcomputingforalmostfivedecadesanditisaverybroaddiscipline,whichcoversawiderangeoftopics.Thefirstknowneventofhackinghadtakenplacein1960atMITandatthesametime,theterm"Hacker"wasoriginated.
Hackingistheactoffindingthepossibleentrypointsthatexistinacomputersystemoracomputernetworkandfinallyenteringintothem.Hackingisusuallydonetogainunauthorizedaccesstoacomputersystemoracomputernetwork,eithertoharmthesystemsortostealsensitiveinformationavailableonthecomputer.
Hackingisusuallylegalaslongasitisbeingdonetofindweaknessesinacomputerornetworksystemfortestingpurpose.ThissortofhackingiswhatwecallEthicalHacking. A computerexpertwhodoestheactofhackingiscalleda"Hacker".Hackersarethosewhoseekknowledge,tounderstandhowsystemsoperate,howtheyaredesigned,andthenattempttoplaywiththesesystems.TypesofHacking We cansegregatehackingintodifferentcategories,basedonwhatisbeinghacked.Hereisasetofexamples−
WebsiteHacking−Hackingawebsitemeanstakingunauthorizedcontroloverawebserveranditsassociatedsoftwaresuchasdatabasesandotherinterfaces.NetworkHacking−HackinganetworkmeansgatheringinformationaboutanetworkbyusingtoolslikeTelnet,NSlookup,Ping,Tracert,Netstat,etc.withtheintenttoharmthenetworksystemandhamperitsoperation.EmailHacking−ItincludesgettingunauthorizedaccessonanEmailaccountandusingitwithouttakingtheconsentofitsowner.EthicalHacking−Ethicalhackinginvolvesfindingweaknessesinacomputerornetworksystemfortestingpurposeandfinallygettingthemfixed.PasswordHacking−Thisistheprocessofrecoveringsecretpasswordsfromdatathathasbeenstoredinortransmittedbyacomputersystem.ComputerHacking−ThisistheprocessofstealingcomputerIDandpasswordbyapplyinghackingmethodsandgettingunauthorizedaccesstoacomputersystem.Tobreakpolicycompliance
WhiteHathackersarealsoknownasEthicalHackers.Theyneverintenttoharmasystem,rathertheytrytofindoutweaknessesinacomputeroranetworksystemasapartofpenetrationtestingandvulnerabilityassessments.
EthicalhackingisnotillegalanditisoneofthedemandingjobsavailableintheITindustry.Therearenumerouscompaniesthathireethicalhackersforpenetrationtestingandvulnerabilityassessments.
BlackHathackers,alsoknownascrackers,arethosewhohackinordertogainunauthorizedaccesstoasystemandharmitsoperationsorstealsensitiveinformation.
BlackHathackingisalwaysillegalbecauseofitsbadintentwhichincludesstealingcorporatedata,violatingprivacy,damagingthesystem,blockingnetworkcommunication,etc.
Greyhathackersareablendofbothblackhatandwhitehathackers.Theyactwithoutmaliciousintentbutfortheirfun,theyexploitasecurityweaknessinacomputersystemornetworkwithouttheowner’spermissionorknowledge.
Theirintentistobringtheweaknesstotheattentionoftheownersandgettingappreciationoralittlebountyfromtheowners.
Apartfromtheabovewell-knownclassesofhackers,wehavethefollowingcategoriesofhackersbasedonwhattheyhackandhowtheydoit−
Redhathackersareagainablendofbothblackhatandwhitehathackers.Theyareusuallyonthelevelofhackinggovernmentagencies,top-secretinformationhubs,andgenerallyanythingthatfallsunderthecategoryofsensitiveinformation.
Abluehathackerissomeoneoutsidecomputersecurityconsultingfirmswhoisusedtobug-testasystempriortoitslaunch.Theylookforloopholesthatcanbeexploitedandtrytoclosethesegaps.MicrosoftalsousesthetermBlueHattorepresentaseriesofsecuritybriefingevents.
Thisisasocialstatusamonghackers,whichisusedtodescribethemostskilled.Newlydiscoveredexploitswillcirculateamongthesehackers.
Ascriptkiddieisanon-expertwhobreaksintocomputersystemsbyusingpre-packagedautomatedtoolswrittenbyothers,usuallywithlittleunderstandingoftheunderlyingconcept,hencethetermKiddie.
Aneophyte,"n00b",or"newbie"or"GreenHatHacker"issomeonewhoisnewtohackingorphreakingandhasalmostnoknowledgeorexperienceoftheworkingsoftechnologyandhacking.
Ahacktivistisahackerwhoutilizestechnologytoannounceasocial,ideological,religious,orpoliticalmessage.Ingeneral,mosthacktivisminvolveswebsitedefacementordenialof-serviceattacks.EthicalHacking-FamousHackers
Inthischapter,wewillhaveabriefsynopsisofsomeofthefamousHackersandhowtheybecamefamous.
JonathanJameswasanAmericanhacker,illfamousasthefirstjuvenilesenttoprisonforcybercrimeinUnitedStates.Hecommittedsuicidein2008ofaself-inflictedgunshotwound.
In1999,attheageof16,hegainedaccesstoseveralcomputersbybreakingthepasswordofaserverthatbelongedtoNASAandstolethesourcecodeoftheInternationalSpaceStationamongothersensitiveinformation.
IanMurphy,alsoknownasCaptainZap,atonepointoftimewashavinghighschoolstudentsstealcomputerequipmentforhim.Ianselfproclaimstohavebeen"thefirsthackereverconvictedofacrime".
Ian'scareerasamasterhackerwasfabricatedin1986afterheandhisunemployedwifedecidedtoformsometypeofbusiness.
HehasalonghistoryofcomputerandInternetfrauds.OneofhisfavouritegamesistoforgeEmailheadersandtosendoutthird-partythreatletters.
KevinMitnickisacomputersecurityconsultantandauthor,whoinfiltrateshisclients’companiestoexposetheirsecuritystrengths,weaknesses,andpotentialloopholes.
HeisthefirsthackertohavehisfaceimmortalizedonanFBI"MostWanted"poster.HewasformerlythemostwantedcomputercriminalinthehistoryofUnitedStates.
Fromthe1970supuntilhislastarrestin1995,heskilfullybypassedcorporatesecuritysafeguards,andfoundhiswayintosomeofthemostwell-guardedsystemssuchasSunMicrosystems,DigitalEquipmentCorporation,Motorola,Netcom,andNokia.
MarkAbene,knownaroundtheworldbyhispseudonymPhiberOptik,isaninformationsecurityexpertandentrepreneur.Hewasahigh-profilehackerinthe1980sandearly1990s.Hewasoneofthefirsthackerstoopenlydebateanddefendthepositivemeritsofethicalhackingasabeneficialtooltoindustry.
Hisexpertisespreadsacrosspenetrationstudies,on-sitesecurityassessments,securecodereviews,securitypolicyreviewandgeneration,systemsandnetworkarchitecture,systemsadministrationandnetworkmanagement,amongmanyothers.HisclienteleincludesAmericanExpress,UBS,FirstUSA,Ernst&Young,KPMGandothers.
JohanHelsingius,betterknownasJulf,cameintothelimelightinthe1980swhenhestartedoperatingtheworld'smostpopularanonymousremailer,calledpenet.fi.
JohanwasalsoresponsibleforproductdevelopmentforthefirstPan-Europeaninternetserviceprovider,EunetInternational.
Heisatpresent,amemberoftheboardofTechnologiaIncognita,ahackerspaceassociationinAmsterdam,andsupportsthecommunicationcompaniesworldwidewithhiscyberknowledge.
LinusTorvaldsisknownasoneof