Eti 5 Unites Notes
Eti 5 Unites Notes
Ethical Hacking:
➔ Finding and fixing security weaknesses before hackers exploit them.
Steps in Hacking:
Gather Information:
➔ Collect data about the target from websites, users, and publications.
Plan Attack:
➔ Create a detailed strategy for the attack.
Acquire Tools:
➔ Get hacking programs needed for the attack.
Attack:
➔ Use weaknesses to break into the target system.
Use Acquired Knowledge:
➔ Use collected personal info for attacks like password guessing.
Hacker-Cracker Separation:
➔ White Hat (good), Grey Hat (mixed), Black Hat (bad), Script Kiddie (amateur); Cracker =
Black Hat hacker.
🔹 Hackers' Motivation:
➔ Hackers solve problems for personal satisfaction, not for fame or money.
🔹 Overall:
➔ Hackers are relentless, curious, and creative problem solvers.
🔹 Policy Considerations:
➔ If ethical hacking is part of a business, a documented security testing policy is needed
(who, what type, and how often testing happens).
🔹 Definition of Hacking:
➔ Hacking = Finding and exploiting weaknesses in computer systems/networks to gain
access.
🔹 Management Trust:
➔ These malicious users take advantage of the trust granted by management, which makes
them hard to detect and prevent.
✅ 2. Respecting Privacy:
Summary Tip:
👉 Ethical hacking must always be careful, responsible, planned, and respectful to both the systems
and the organization.
🔹 6. Moving On
Start
↓
Planning
- Get Approval
- Define Scope
- Decide Timeline
Selecting Tools
Evaluating Results
- Analyze Vulnerabilities
- Prepare Reports
Moving On
- Fix Issues
End
Hacker Mindset:
1. Purpose of Hacking: Hackers may hack for knowledge, thrill, or even malicious
gain. They explore systems and manipulate them to see how far they can go.
2. Hacker Classifications:
o Script Kiddies: Beginners using pre-made tools without understanding the
technicalities.
o Criminal Hackers: Skilled experts using hacking tools for malicious
purposes.
o Security Researchers: Professionals creating tools and analyzing
vulnerabilities for security improvement.
3. Motivations:
o Hacktivists: Hackers with political or social agendas.
o Cyber-terrorists: Attack government or public utilities.
o Hackers for Hire: Operate for profit within organized crime.
o Internal Threats: Insiders with access to sensitive systems pose a significant
risk.
4. Why Hackers Hack: They might do it for fun, to challenge authority, or to promote
personal agendas such as political or social change. Some may hack out of curiosity
or boredom, while others might be seeking revenge or financial gain.
5. Security Implications: Hackers use techniques like exploiting network
vulnerabilities, hiding their tracks, and using anonymity resources (like proxy servers)
to remain undetected.
Ethical Hackers:
The knowledge required to become an ethical hacker includes a mix of technical skills,
hands-on practice, and a deep understanding of security principles. Here's an outline of the
key points:
1. Programming Knowledge
2. Operating Systems
Master UNIX/Linux: UNIX-based systems (like Linux) are often used for hacking
due to their robustness and flexibility. You need to learn command-line tools and how
to navigate Linux systems.
Learn Multiple OS: Familiarity with Windows, Mac, and Linux systems is essential
because different systems have different vulnerabilities.
3. Networking Knowledge
4. Cryptography
6. Penetration Testing
Understand and apply Pen Testing Techniques: The process of testing a system’s
security by trying to exploit its vulnerabilities, often using tools like Burp Suite,
Wireshark, and Metasploit.
11. Be Responsible
Back-End Developer
Software Developer
Computer Networking Specialist
By following these steps and focusing on continual learning and practical experience, you can
build a strong foundation to become an ethical hacker.