Ethical Hacking discussion

User Generated

iawvxf

Computer Science

Description

In 6–7 pages, complete the following

A.

You have been asked to document and describe the hacking process. After all, the goal of white hat hacking is to ensure the security of the company resources, and documentation is always part of the process. In a report to your manager, describe the following topics:

  • The hacking methodology and phases
  • How scope is established and why the agreement of the scope is important
  • How ethics come into play when conducting ethical hacking

B.

Your colleagues heard that you are starting to hack the company systems, and they start asking questions, initially focusing on the ethical nature of the topic. You want to tell them how and why the hacking that you will be doing will actually help the company.

  • Discuss the process of hacking, in terms of white hat, black hat, and grey hat hackers.
    • How does each one of these differ, and how are they the same?
    • Why do ethical hackers study the methods of black hat hackers?
  • Provide definitions for the following concepts:
    • White hat hackers
    • Grey hat hackers
    • Black hat hackers
  • Describe why white hack hackers need to learn what black hat hackers do and the mechanisms they use to accomplish their tasks.


User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, please see the attached paper. Have a look at it and in case of any edit, please let me know. Otherwise, it is my pleasure to have you as my buddy now and future. Until the next invite, Bye!

Running Head: ETHICAL HACKING

1

Ethical Hacking
Name
Institution Affiliation

ETHICAL HACKING

2
Ethical Hacking
A. Hacking Methodology and Phases

The hacking process, like any other activity, requires an individual to follow a logical
series of steps designed to take advantage of the vulnerabilities of the targeted victim and gain
access to their systems. Reconnaissance, the first phase in the methodology, involves two stages,
the active and passive stages. The Passive phase includes collecting information about the target,
like the range of IP address and records of DNS while keeping interaction at the lowest. The next
step involves the hacker actively investigating the mark using features such as Zenmap to ensure
the attack is precise. This information can also be subject to authentication, enumeration stage,
where the attacker determines the usefulness of the collected data.
After carefully considering a plan, the hacker then decides to execute the penetration
process using the available tools. This exploitation procedure shortly precedes the escalation of
privilege where the hacker seeks to establish superuser by moving up the levels from a low-level
account to becoming the administrator. At this particular point, the hacker then decides to launch
persistence by creating backdoor channels, which are programs designed to grant the attacker
unapproved, remote access to the user's system later on, in case of a quick disconnection. It is at
this juncture, that the infiltrator commits the real intended act, corrupting, encrypting or, stealing
data from the victim's system (Mukhopadhyay, & Nath, 2014).
The last stage of the hacking process will involve covering the digital footprints and
signatures left behind during the penetration. This phase is crucial both to penetration testing and
criminal hacking, as it consists of the protection of the vulnerabilities that increased the chances
of success of the exploitation. If a breach gets discovered the vulnerabilities, mediation may lead

ETHICAL HACKING

3

to the detection of vulnerable sections of the structure. Therefore, this last stage centers on the
purging of log files to remove evidence that evidence the occurrence of any breach.
Scope
For an ethical hacking exercise to be legal and within the set boundaries of ...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags