Open Access Open Access  Restricted Access Subscription or Fee Access

A Guide to Ethical Hacking Attacks and Recent Tools

B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu

Abstract


“To beat a hacker you need to think like a hacker”. Ethical hacking can be used to identify vulnerabilities in a system and it attempts to increase security. Ethical hacking also called penetration testing to test and check possible weak links and vulnerabilities. An ethical hacker neither damage a target system nor steal information. Businesses and other organization hire ethical hackers to improve their network or computers security. Many tools are used to hack a system or network by ethical hackers to identify the vulnerabilities, same tools can be used by crackers to penetrate in to the system. This paper describes what is ethical hacking, phases of ethical hacking and some tools used by ethical hackers.

Keywords


Hacker, Ethical Hacking, Cracker.

Full Text:

PDF

References


Ethical hacking by C .C .Palmer ,IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001.

http://itproblemsolving.blogspot.in/2012/06/project-6-ethical-hacking.html

Smith B., Yurcik W., Doss D., “Ethical Hacking: the security justification redux”, IEEE Transactions, pp. 375-379, 2002.

H.M David, “Three Different Shades of Ethical Hacking: Black, White and Gray,” in GSEC Practical Assignment, Version 1.4b, Option 1, Feb 23, 2004.

D. Manthan “Hacking for beginners”, 254 pages, 2010.

Gurpreet K. Juneja “Ethical hacking: a technique to enhance information security” Vol. 2, Issue 12, December 2013

Sonal Beniwal, 2 Sneha” Ethical Hacking: A Security Technique” IJARCSSE Volume 5, Issue 4, 2015

Ajinkya A. Farsole, Amurta G. Kashikar and Apurva Zunzunwala , “Ethical Hacking, International journal of Computer Applications (0975-8887), Vol. 1 No. 10, pp. 14-20, 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.