Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Hacking
Types of Hackers
Methodology of Hacking
Hacking Tools
Conclusion
References
INTRODUCTION
The Internet is still growing and e-commerce is on its advance. The vast growth of Internet has
brought many good things thats easy access to vast stores of reference material etc. More and
more computers get connected to the Internet, wireless devices and networks are booming. Due
to the advance technology of the Internet, the government, private industry and the everyday
computer user have fears of their data or private information being comprised by a criminal
hacker .
Security
Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking
activities is generally referred to as a hacker. This hacker may alter system or security features to
accomplish a goal that differs from the original purpose.
Ethical hacking
White-hat hacker
Gray-hat hacker
REQUIRED SKILLS OF AN HACKER
There are several skills requires of an hackers :-
Information Gathering
Gaining access
SCANNING & ENUMERATION
There are different types of enumeration :-
NetBIOS
Password Cracking
Dictionary cracking
Social engineering
Nmap
TOP TEN HACKING TOOLS
Wireshark
Metasploit
Burp suite
Aircrack-ng
Nessus
THC hydra
Hping3
Putty
HACKING PREVENTIONS TECHNIQUES
For avoid hacking we used different techniques :-
Security Infrastructure
Code Review
Security Patches
ADVANTAGES
Helps in closing the open holes in the system network
An evolving technique
DISADVANTAGES
All depends upon the trustworthiness of the ethical hacker
http://www.gangte.net/2013/09/top-10-best-hacking-tools.html
Smith B., Yurcik W., Doss D., Ethical Hacking: the security justification redux, IEEE
Transactions, pp. 375-379, 2002.