Compromising Systems:Implementing Hacking Phases
In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the warriors of the internet. They attack and do harmful things to compromised system. This paper will show the methodology use by hackers to gained access to system and the different tools used by them and how they are group based on their skills. It will identify exploits that can be used to attack a system and find mitigation to those exploits.
In addition, the paper discusses the actual implementation of the hacking phases with the virtual machines use in the process. The virtual machines specification is also listed. it will also provide means and insights on how to protect one system from being compromised.
Keywords
- S. Begum and S. Kumar, “IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A COMPREHENSIVE STUDY ON ETHICAL HACKING,” vol. 5, no. 8, pp. 214–219, 2016.
- “Role of Ethical Hacking in System,” no. May, 2018.
- “What is white hat? - Definition from WhatIs.com.” [Online]. Available: https://searchsecurity.techtarget.com/definition/white-hat. [Accessed: 14-Mar-2019].
- “What is ethical hacker? - Definition from WhatIs.com.” [Online]. Available: https://searchsecurity.techtarget.com/definition/ethical-hacker. [Accessed: 14-Apr-2019].
- “Types of Hackers and What They Do: White, Black, and Grey | EC-Council Official Blog.” [Online]. Available: https://blog.eccouncil.org/types-of-hackers-and-what-they-do-white-black-and-grey/. [Accessed: 14-Mar-2019].
- “What is the Difference Between Black, White and Grey Hat Hackers?” [Online]. Available: https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html. [Accessed: 14-Mar-2019].
- S. Satapathy and D. Ranjan Patra, “Ethical Hacking,” Int. J. Sci. Res. Publ., vol. 5, no. 6, pp. 2250– 3153, 2015.
- C. C. Palmer, “Ethical hacking,” vol. 40, no. 3, pp. 769–780, 2001.
- I.-C. MIHAI, “Penetration Tests on Virtual Environment,” Int. J. Inf. Secur. Cybercrime, vol. 1, no. 1, pp. 37–45, 2016.
- B. Sahare, A. Naik, and S. Khandey, “Study Of Ethical Hacking,” vol. 2, no. 4, pp. 6–10, 2014.
- D. Hafele, “Information Security Reading Room Three Different Shades of Ethical Hacking : Black , White and Gray In tu ll r igh,” 2019.
- “Exploitable vulnerabilities #1 (MS08-067).” [Online]. Available: https://blog.rapid7.com/2014/02/03/new-ms08-067/. [Accessed: 14-Mar-2019].
- “ Microsoft Security Bulletin MS08-067 - Critical | Microsoft Docs.” [Online]. Available: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067. [Accessed: 21-Mar-2019].
Abstract Views: 314
PDF Views: 143