Professional Documents
Culture Documents
Ethical Hacking Notes
Ethical Hacking Notes
APPLICATION PENETRATION
TESTING
SUBMITTED BY
SURAJ SINGH
Introduction
What is Ethical Hacking
Who are Hackers
Types of Hackers
Process of Hacking
Ethical Hacking – Process
Foot Printing
Scanning
Gaining Access
Maintaining Access
Why do you need Ethical Hacking
Ethical hacking also known as penetration
testing or white-hat hacking, involves the same
tools, tricks, and techniques that hackers use ,
but with one major difference that Ethical
hacking is legal.
A person who enjoys learning details of a
programming language or system.
o Hacker –
The person who hacks
o Cracker –
System intruder/destroyer
BLACK HAT HACKERS
A black hat hackers use their knowledge and skill for their own
personal gains probably by hurting others.
• TOOLS
WhoIs Lookup
NS Lookup
IP Lookup
Scanning is the procedure of identifying active
hosts, ports and the services used by the target
application.
TOOLS
Port scanning
Network Scanning
Fire walking
The process of extracting user names, machine
names, network resources, shares and services
from a system.
TOOLS
John the Ripper
Metasploit
Nmap
Gaining Access is the process where hacker can
grant the access without owner permission
TOOLS
Password Attacks
Social Engineering
Viruses
Hacker may just hack the system to show it was
vulnerable or he can be so mischievous that he
wants to maintain or persist the connection in the
background without the knowledge of the user.
TOOLS
Os BackDoors
Trojans
Microsoft: skills in operation, configuration and
management.