Chapter 1
Chapter 1
Introduction
To Ethical
Hacking
TOPICS
Target of Exploit
Hack Value Evaluation Attack
an attack on a
(TOE)
Notion used by an action that is computer system,
hackers to express done on a system especially one that
A system, program,
that something is to get its access takes advantage of
or network that is t
worth doing or is and extract a particular
he subject of a sec
interesting. sensitive data. vulnerability that
urity analysis or att
the system offers
ack.
to intruders.
Ethical Hacking Terminologies
Security
Vulnerability
Zero Day it involves gaining Threat
The existence of a software
access to a network
Is an attack that Anything that has t flaw, logic design, or
and /or computer and
exploits the he potential to caus implementation error that
then using the same
computer e serious harm to a can lead to an
information to gain
vulnerability before computer system. unexpected and
access to multiple
software engineer undesirable event
networks and
releases a patch. executing bad or
computers that
damaging instructions to
contains desirable
the system.
information.
Ethical Hacking Terminologies
Daisy Chaining
RECONNAISSANCE SCANNING
Also called as Footprinting and where hacker dive deeper into the
information gathering Phase system to look for valuable data
and services in a specific IP address
range.
GAINING ACCESS
MAINTAINING ACCESS
Attacker breaks into the
system/network using various The aim is to maintain the access to
tools or methods. the target until he finishes the tasks
he planned to accomplish in that
target.
HACKING METHODOLOGIES
CLEARING TRACK
This involves modifying/corrupting/deleting
the values of Logs, modifying registry values
and uninstalling all applications he used and
deleting all folders created.
1.2
DISPLAY TYPE OF
HACKER
‘BLACK HAT’
HACKERS ‘WHITE HAT’
HACKERS
An individual who
attempts to gain The good guys, working
unauthorized entry into with organizations to
a system or network to strengthen the security
exploit them for of a system.
malicious reasons.
‘GREY HAT’ HACKERS
Grey hats exploit networks and
computer systems in the way that black
hats do, but do so without any
malicious intent, disclosing all
loopholes and vulnerabilities to law
enforcement agencies or intelligence
agencies.
Testing Types