Amit A. Pardeshi (2642) : Presented By
Amit A. Pardeshi (2642) : Presented By
Ethical hacking can ensure that vendors’ claims about the security of their
products are legitimate.
Ethical hacker possesses the skills, mindset, and tools of a hacker but is also
“trustworthy “
Attacking your own systems to discover vulnerabilities is a step to
making them more secure.
This is the only proven method of greatly hardening your systems from attack.
If you don’t identify weaknesses, it’s a matter of time before the vulnerabilities are exploited.
Network-infrastructure attacks
Easy Attacks, because many networks can be reached via Internet.
Installing a network analyzer on a network and capturing every packet that
travels across it, revealing confidential information in clear text.
Connecting into a network through a rogue modem attached to a computer
behind a firewall.
Exploiting weaknesses in network transport mechanisms, such as TCP/IP.
Operating-system attacks
Examples:-
Cracking passwords and encryption mechanisms
Attacking built-in authentication systems
Breaking file-system security
Exploiting specific protocol implementations
Working ethically
Respecting privacy
Avoid Crashing
By easily creating DoS conditions on systems when testing.
Using security-assessment tools can control the number of tests that are
performed on a system at the same time.