Related papers
IJERT-Ethical Hacking Techniques with Penetration Testing
IJERT Journal
International Journal of Engineering Research and Technology (IJERT), 2019
https://www.ijert.org/ethical-hacking-techniques-with-penetration-testing https://www.ijert.org/research/ethical-hacking-techniques-with-penetration-testing-IJERTCONV7IS11044.pdf Hacking is an activity in which a person exploits the weakness in a system for self-profit or gratification. Ethical hacking is an identical activity which aims to find and rectify the weaknesses in a system. In the growing era of internet computer security is of utmost concern for the organizations and government. These organizations are using Internet in their wide variety of applications such as electronic commerce, marketing and database access. But at the same time, data and network security is a serious issue that has to be talked about. This paper attempts to discuss the overview of hacking and how ethical hacking disturbs the security. Also the Ethical Hackers and Malicious Hackers are different from each other and playing their important roles in security. This paper studied the different types of hacking with its phases. The hacking can also be categorized mainly in three categories such as white hat, black hat and grey hat hacking. This paper also presents a comparison of the hacking categories with different methods of penetration testing.
View PDFchevron_right
Ethical Hacking and Penetration Testing
Rishabh Upadhyay
The Paper includes the Vulnerability Assessment of University of Allahabad network
View PDFchevron_right
Selected advanced themes in ethical hacking and penetration testing
saed thuneibat
Computer Science and Information Technologies
Since 1980 cyberattacks have been evolving with the rising numbers of internet users and the constant evolving of security systems, and since then security systems experts have been trying to fight these kinds of attacks. This paper has both ethical and scientific goals, ethically, to raise awareness on cyberattacks and provide people with the knowledge that allows them to use the world wide web with fewer worries knowing how to protect their information and their devices with what they can. Scientifically, this paper includes a deep understanding of types of hackers, attacks, and various ways to stay safe online. This research investigates how ethical hackers adapt to the current and upcoming cyber threats. The different approaches for some famous hacking types along with their results are shown. Python and Ruby are used for coding, which we run on Kali Linux operating system.
View PDFchevron_right
Ethical Dilemmas and Dimensions in Penetration Testing
John McAlaney
View PDFchevron_right
The Basics of hacking and penetration Testing
Grei Show
View PDFchevron_right
Google Hacking As A General Education Tool
James W McGuffee
In order to give students hand-on experiences with Internet and World Wide Web security issues, this paper advocates using Google hacking search exercises in a non-majors computer science general education course.
View PDFchevron_right
The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle
WARSE The World Academy of Research in Science and Engineering
International Journal of Advanced Trends in Computer Science and Engineering , 2021
Ethical hackers are using different tools and techniques to encounter malicious cyber-attacks generated by bad hackers. During the software development process, development teams typically bypass or ignore the security parameters of the software. Whereas, with the advent of online web-based software, security is an essential part of the software development process for implementing secure software. Security features cannot be added as additional at the end of the software deployment process, but they need to be paid attention throughout the SDLC. In that view, this paper presents a new, Ethical Hacking-Software Development Life Cycle (EH-SDLC) introducing ethical hacking processes and phases to be followed during the SDLC. Adopting these techniques in SDLC ensures that consumers find the end-product safe, secure and stable. Having a team of penetration testers as part of the SDLC process will help you avoid incurring unnecessary costs that come up after the data breach. This research work aims to discuss different operating systems and tools in order to facilitate the secure execution of the penetration tests during SDLC. Thus, it helps to improve the confidentiality, integrity, and availability of the software products.
View PDFchevron_right
Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System
Somanjoli Mohapatra
2015
During the development of the Internet, computer security has become a major concern for different industries, businesses and Governments. The organizations use the Internet for electronic commerce, advertising, information distribution and access, and other pursuits, but they are worried about the possibility of being "hacked". Ethical Hacking increases security protection. Public and Private organizations migrate more of their critical information through the Internet, criminals have more opportunity and incentive to gain access to sensitive information through the Web application. Thus the need of protecting the systems from the nuisance of hacking generated by the hackers is to promote the persons who will punch back the illegal attacks on our computer systems. So, Ethical hacking is an assessment to test and check an information technology environment for possible weak links and vulnerabilities. Ethical hacking describes the process of hacking a network with good inte...
View PDFchevron_right
A REVIEW PAPER ON ETHICAL HACKING
IAEME Publication
IAEME PUBLICATION, 2020
An ethical hacker is the network specialist & computer who pounce some security systems on the behalf of its possessor seeking amenability that could be exploited by a malicious hacker. The Internet's explosive growth has conduct many virtuous things: e-commerce, e-mail, collaborative computing & new fields for advertisement and information distribution. Ethical hacking has become a main anxiety for businesses & governments, also known as the intrusion testing or penetration testing or red teaming. Organizations are concerned about the probability of being "hacked" & potential clients are concerned about keeping personal information under control. Hackers are classified according to their work and knowledge. The white hat hackers are the ethical hackers. Ethical hackers use hacking approaches to ensure safety. Ethical hacking is needed to protect the system from the hacker's damage. The major reason behind the ethical hacking study is to assess the security and report back to the owner of the target system. This paper provides a brief ideas of the ethical hacking & every aspects.
View PDFchevron_right
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools
Paolo Modesti, Lewis Golightly
Journal of Cybersecurity and Privacy, 2024
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by practitioners within the industry or underground communities. Similarly, academic researchers have also contributed to developing security tools. However, there appears to be limited awareness among practitioners of academic contributions in this domain, creating a significant gap between industry and academia's contributions to EH tools. This research paper aims to survey the current state of EH academic research, primarily focusing on research-informed security tools. We categorise these tools into process-based frameworks (such as PTES and Mitre ATT&CK) and knowledge-based frameworks (such as CyBOK and ACM CCS). This classification provides a comprehensive overview of novel, research-informed tools, considering their functionality and application areas. The analysis covers licensing, release dates, source code availability, development activity, and peer review status, providing valuable insights into the current state of research in this field.
View PDFchevron_right