1-Introduction Ethical Hacking
1-Introduction Ethical Hacking
Threat
Vulnerability
Exploit
Target Of Evaluation
Zero-Day Vulnerability
www.eduors.com www.facebook.com/eduors
Identifying Different Types of Hacking Technologies
Operating systems
Applications
Shrink-wrap code
Misconfigurations
www.eduors.com www.facebook.com/eduors
Understanding the Different Phases Involved in Ethical
Hacking and Listing the Five Stages of Ethical Hacking
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
www.eduors.com www.facebook.com/eduors
Hacker Classes
White hats
Black hats
Grey hats
Hacktivism
www.eduors.com www.facebook.com/eduors
Security consists of four basic elements
Confidentiality
Authenticity
Integrity
Availability
www.eduors.com www.facebook.com/eduors
Security, Functionality, and Ease of Use Triangle
www.eduors.com www.facebook.com/eduors
Penetration Testing
www.eduors.com www.facebook.com/eduors
Testing Types
Black box
White box
Grey box
www.eduors.com www.facebook.com/eduors
Types of Ethical Hacks
Remote network
Remote dial-up network
Local network
Stolen equipment
Social engineering
Physical entry
www.eduors.com www.facebook.com/eduors
Types of Vulnerabilities
www.eduors.com www.facebook.com/eduors
Vulnerability Research web sites
http://www.securityfocus.com/
http://nvd.nist.gov/
http://www.securitytracker.com/
http://www.securiteam.com/
www.eduors.com www.facebook.com/eduors
Exploits Type
Remote Exploit
Local Exploit
www.eduors.com www.facebook.com/eduors
Exploits Research web site
http://www.exploit-db.com
http://www.securitytube.net/
www.eduors.com www.facebook.com/eduors
Penetration Test Report
http://www.offensive-security.com/penetration-testing-sample-
report.pdf
http://www.vulnerabilityassessment.co.uk/report%20template.html
http://www.besnard.org/biometrics/2BIO706_business_report.pdf