ethicalhacking-130625095228-phpapp01.pdf

P hase 3 g aining a p hase 4 m aintaining a ccess

Info icon This preview shows pages 4–7. Sign up to view the full content.

CANNING 15 2.1.3 P HASE 3- G AINING A CCESS 16 2.1.4 P HASE 4- M AINTAINING A CCESS 17 2.1.5 P HASE 5- C LEARING T RACKS 19 2.2 UNDERSTANDING TESTING TYPES 19 2.3 TOOLS USED IN ETHICAL HACK 20 CHAPTER 3: CONCLUSION 21 3.1 HOW TO BE ETHICAL 21 3.1.1 PERFORMING A PENETRATION TEST 22 3.2 ETHICAL HACKING REPORT 22 REFERENCES 24
Image of page 4

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

5 CHAPTER 1: INTRODUCTION TO ETHICAL HACKING CHAPTER 1: INTRODUCTION TO ETHICAL HACKING 1.1 INTRODUCTION T he Internet is still growing and e-commerce is on its advance. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more complicated and user friendly [1]. Therefore, Security is a hot topic and quite some effort is spend in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys between the ones who are trying hard to keep information secured and the ones who are trying to get prohibited access to this information. Securing an information technology environment does not just consist of a bunch of actions which can be taken and then everything can be forgotten there is no fire and forget solution - security is a never ending process. OBJECTIVE COVERED IN THIS CHAPTER: INTRODUCTION ETHICAL HACKING TERMINOLOGY THE JOB ROLE OF AN ETHICAL HACKER TYPES OF ETHICAL HACKERS ETHICAL HACKERS VERSUS CRACKER WHAT DO ETHICAL HACKERS DO? AN ETHICAL HACKER’S SKILL SET
Image of page 5