20120130

Learn Ethical Hacking Basics :: Session VII



Continuation purpose related posts:-  Learn Ethical Hacking Basics Session I to VII



Define ethical hacking 



Ethical hackers perform penetration tests. They perform the same activities a hacker would but without malicious intent. They must work closely with the host organization to understand what the organization is trying to protect, who they are trying to protect these assets from, and how much money and resources the organization is willing to expend to protect the assets. 



By following a methodology similar to that of an attacker, ethical hackers seek to see what type of public information is available about the organization. Information leakage can reveal critical details about an organization, such as its structure, assets, and defensive mechanisms. After the ethical hacker gathers this information, it will be evaluated to determine whether it poses any potential risk. The ethical hacker further probes the network at this point to test for any unseen weaknesses. 



Penetration tests are sometimes performed in a double blind environment. This means that the internal security team has not been informed of the penetration test. This serves as an important purpose, allowing management to gauge the security team’s responses to the ethical hacker’s probing and scanning. Do they notice the probes or have the attempted attacks gone unnoticed? Now that the activities performed by ethical hackers have been described, let’s spend some time discussing the skills that ethical hackers need, the different types of security tests that ethical hackers perform, and the ethical hacker rules of engagement. 

Related Posts:- Learn Ethical Hacking Basics Session 4
                           Learn How to Break Into A Windows PC
                           Ethical Hacking Basics Session 1 & 2 
                          Learn Ethical Hacking Basics :: Session VI

No comments:

Post a Comment