Ethical Hacking discussion

timer Asked: Feb 23rd, 2019
account_balance_wallet $30

Question Description

In 6–7 pages, complete the following


You have been asked to document and describe the hacking process. After all, the goal of white hat hacking is to ensure the security of the company resources, and documentation is always part of the process. In a report to your manager, describe the following topics:

  • The hacking methodology and phases
  • How scope is established and why the agreement of the scope is important
  • How ethics come into play when conducting ethical hacking


Your colleagues heard that you are starting to hack the company systems, and they start asking questions, initially focusing on the ethical nature of the topic. You want to tell them how and why the hacking that you will be doing will actually help the company.

  • Discuss the process of hacking, in terms of white hat, black hat, and grey hat hackers.
    • How does each one of these differ, and how are they the same?
    • Why do ethical hackers study the methods of black hat hackers?
  • Provide definitions for the following concepts:
    • White hat hackers
    • Grey hat hackers
    • Black hat hackers
  • Describe why white hack hackers need to learn what black hat hackers do and the mechanisms they use to accomplish their tasks.

Tutor Answer

School: Rice University

Hi, please see the attached paper. Have a look at it and in case of any edit, please let me know. Otherwise, it is my pleasure to have you as my buddy now and future. Until the next invite, Bye!



Ethical Hacking
Institution Affiliation


Ethical Hacking
A. Hacking Methodology and Phases

The hacking process, like any other activity, requires an individual to follow a logical
series of steps designed to take advantage of the vulnerabilities of the targeted victim and gain
access to their systems. Reconnaissance, the first phase in the methodology, involves two stages,
the active and passive stages. The Passive phase includes collecting information about the target,
like the range of IP address and records of DNS while keeping interaction at the lowest. The next
step involves the hacker actively investigating the mark using features such as Zenmap to ensure
the attack is precise. This information can also be subject to authentication, enumeration stage,
where the attacker determines the usefulness of the collected data.
After carefully considering a plan, the hacker then decides to execute the penetration
process using the available tools. This exploitation procedure shortly precedes the escalation of
privilege where the hacker seeks to establish superuser by moving up the levels from a low-level
account to becoming the administrator. At this particular point, the hacker then decides to launch
persistence by creating backdoor channels, which are programs designed to grant the attacker
unapproved, remote access to the user's system later on, in case of a quick disconnection. It is at
this juncture, that the infiltrator commits the real intended act, corrupting, encrypting or, stealing
data from the victim's system (Mukhopadhyay, & Nath, 2014).
The last stage of the hacking process will involve covering the digital footprints and
signatures left behind during the penetration. This phase is crucial both to penetration testing and
criminal hacking, as it consists of the protection of the vulnerabilities that increased the chances
of success of the exploitation. If a breach gets discovered the vulnerabilities, mediation may lead



to the detection of vulnerable sections of the structure. Therefore, this last stage centers on the
purging of log files to remove evidence that evidence the occurrence of any breach.
For an ethical hacking exercise to be legal and within the set boundaries of ...

flag Report DMCA

Goes above and beyond expectations !

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors