Hackers: a person who access computer system or network without authorization
Knowing this statement will directly told us that it has against some one's privacy of doing so. That is why there are many people called Script Kiddies or packet monkeys, which means inexperienced hackers, doing hacking activity without realising the rules available for cyber activity. However, hacking activity is sometimes necessary for security test purpose. Therefore, there is a term called Ethical Hackers, which means that they are employed by companies to perform penetration test or any hacking activity with the owner's permission. There are also steps to be an ethical hacker.
Steps:
1. Target Scoping
2. Information Gathering
3. Target Discovery
4. Enumerating Target
5. Vulnerability Mapping
6. Social Engineering
7. Target Exploitation
8. Privilage Escalation
9. Maintaining Access
10. Documenting and Reporting
Being ethical hacker is important to keep us in the green zone, by means here is to be able doing hacking activity by still abiding the rule applied in a particular hacking. So you can still doing your hobby without hurting some one's property or privacy.
Each and every step will be discussed more detail on the next blog I will create. Of course, with more interesting tools to be used.
Steps:
1. Target Scoping
2. Information Gathering
3. Target Discovery
4. Enumerating Target
5. Vulnerability Mapping
6. Social Engineering
7. Target Exploitation
8. Privilage Escalation
9. Maintaining Access
10. Documenting and Reporting
Being ethical hacker is important to keep us in the green zone, by means here is to be able doing hacking activity by still abiding the rule applied in a particular hacking. So you can still doing your hobby without hurting some one's property or privacy.
Each and every step will be discussed more detail on the next blog I will create. Of course, with more interesting tools to be used.
No comments:
Post a Comment