Ethical Hacking in Linux Environment: Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram
Ethical Hacking in Linux Environment: Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram
Ethical Hacking in Linux Environment: Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram
Abstract
Ethical Hacking which attempts to
pro-actively increase security protection by
identifying and patching known security
vulnerabilities on systems owned by other parties.
Ethical hackers may beta test unreleased
software, stress test released software, and scan
networks of computers for vulnerabilities. Ethical
hacking can be defined as the practice of hacking
without no malicious intention, rather evaluate
target system with a hackers perspectives.[1][7]
Hacking is a process to bypass the security
mechanisms of an information system or
network. In common usage, hacker is a generic
term for a computer criminal. Hacking is an
unprivileged usage of computer and network
resources. The term "hacker" originally meant a
very gifted programmer. In recent years though,
with easier access to multiple systems, it now has
negative implications.
Keywords Ethical standards[2], Penetration,
Exploits, Philosophy of Hacking, Emanations,
Vandalism.
I.
INTRODUCTION
II.
RELATED WORK
1854 | P a g e
1855 | P a g e
1856 | P a g e
1857 | P a g e
5.
6.
6.
7.
8.
9.
1858 | P a g e
8.
9.
1859 | P a g e
III.
6)
CONCLUSION
7)
8)
9)
10)
11)
12)
13)
14)
REFERENCES
1)
2)
3)
4)
5)
1860 | P a g e