Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Guide to Ethical Hacking Attacks and Recent Tools


     

   Subscribe/Renew Journal


“To beat a hacker you need to think like a hacker”. Ethical hacking can be used to identify vulnerabilities in a system and it attempts to increase security. Ethical hacking also called penetration testing to test and check possible weak links and vulnerabilities. An ethical hacker neither damage a target system nor steal information. Businesses and other organization hire ethical hackers to improve their network or computers security. Many tools are used to hack a system or network by ethical hackers to identify the vulnerabilities, same tools can be used by crackers to penetrate in to the system. This paper describes what is ethical hacking, phases of ethical hacking and some tools used by ethical hackers.

Keywords

Hacker, Ethical Hacking, Cracker.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 190

PDF Views: 2




  • A Guide to Ethical Hacking Attacks and Recent Tools

Abstract Views: 190  |  PDF Views: 2

Authors

Abstract


“To beat a hacker you need to think like a hacker”. Ethical hacking can be used to identify vulnerabilities in a system and it attempts to increase security. Ethical hacking also called penetration testing to test and check possible weak links and vulnerabilities. An ethical hacker neither damage a target system nor steal information. Businesses and other organization hire ethical hackers to improve their network or computers security. Many tools are used to hack a system or network by ethical hackers to identify the vulnerabilities, same tools can be used by crackers to penetrate in to the system. This paper describes what is ethical hacking, phases of ethical hacking and some tools used by ethical hackers.

Keywords


Hacker, Ethical Hacking, Cracker.