You are on page 1of 1

Hacking is digging deep into system and applications.

Trying to understand how things work


better sometimes using the tools or techniques that may break things. Due to mass media the
word hacker became more very much overused. Unethical hacker’s are malicious and use
techniques for their personal purposes. Ethical Hacker’s perform there activities within ethical
boundaries and in most cases have approval from the people from whom they want to hack.
Ethical hackers have permission from their client or the owner of the system they want to hack.

Malicious Hackers - Black hat (who break the law)

Ethical Hackers - White hat(who work for a company, to find vulnerabilities in systems and help
them diagnose them and increase security)

Grey hat(who do out of their self interest, but they do not imply harm. Intentional harm is there
agenda, but sometimes it might happen)->harmful

Certified Ethical Hacker:- No. Of questions: 125, Test Duration: 4 Hrs, Test format: MCQ’s by a
council.

Terminology:

Threat:-which potentially harm the application

Threat agent:-The guys who choose to attack this agents become threat agents

Vulnerability:-The guy should find a vulnerability to find this threat

Flaw:-A wrong design decision to run a mechanism

Issue:-When we have something that reduces the security of a system

Exploit:-Take advantage of a vulnerability

Attack:-Threats becoming actual to the target through exploiting a vulnerability

Risk:-Combined value of probability and impact

Incident:-When attack happens or the security compromises

Counter measure:- physical, logical(technical) and organisational controls(Aimed at lowering the


risk)

Control:-Way to limit the risk

Security Audit:-Auditing the security of a system over a period of time

Security Assessment:-Finding what is going at present in the system or what happened before
they came in.

Penetration test:-It’s a test, basically sends a signal and finds out how people are responding to
them. Testing the system in terms of resistance and resilience to penetration testing/attacks.

Assessment scope:-boundaries in time space which defines what is to be assed in a given period
of time. Narrow down to a specific target.

Pentest Report:-Producing clean and good reports is a very important point, report has to have
different types of points. It is a summary.

White box :-we do not spend time on reconnaissance at all, we have unlimited scope from the
very beginning

Black box:-have zero scope of the assessment we start

Grey box:-In between the white box and black box

Reporting is a very important task, It has to simple and understandable to the company’s
manager or people with statement and scope of it and Moto and what level of hacker has been
imitated. Executive summary, summary of what level of scope has been executed in terms of
security and why. Then list the actions to be taken to limit the vulnerability.

Technical summary:-What you did to penetrate the vulnerability and recommendations for reduce
it.

Bug bounty program:-find bugs in facebook, google, etc which is based upon the report as shown
above.

CIA: Confidentiality, Integrity and Availability

Confidentiality:-quality feature of information, no unauthorised access(business data), whereas


privacy(individual data)

Integrity:-lack of change, no external person has changed data other than the known people.

Availability:-authorised users can access the data.

You might also like