Description
THERE ARE 2 PARTS (PLEASE FOCUS ON POINTS NOT TOO MUCH DESCRIPTIVE)
PART 1(2 PAGES)
Please summarize the article below;
https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/
PART 2 (5 TO 6 PAGES)
White Hat Hacking and Planning a Hack
Module Description:
In order to carry out an effective white hat operation for a company you first need a plan.To better understand how to develop a plan you need to understand who the hacker is and how they function.
First, learn about the hacker and telling the white hats, gray hats, and black hats apart.Also learn why it is important to stay ethical.
- Read Part I Preparing for the War in Gray Hat HackingThe Ethical Hacker’s Handbook, Fourth Editionhttp://library.books24x7.com.ezp-02.lirn.net/toc.aspx?bookid=77172
- Watch Hacking Classes – 1:What is and who is a hacker https://youtu.be/39UkM2ugLlg
- Watch the Lynda.com tutorial Hackers and the kill chainhttp://www.lynda.com/N-Stalker-tutorials/Hackers-kill-chain/164982/187647-4.html
- Read Chapter 2 Ethics and Hacking http://library.books24x7.com.ezp-02.lirn.net/assetviewer.aspx?bookid=56567&chunkid=742589661
- Read Chapter 1 Hacking: the Next Generation in Hacker Techniques, Tools, and Incident Handling.http://library.books24x7.com.ezp-02.lirn.net/assetviewer.aspx?bookid=69818&chunkid=385012513¬eMenuToggle=0&hitSectionMenuToggle=0&leftMenuState=1
- Read Section I, Chapter 1 in Web Security: A WhiteHat Perspective http://library.books24x7.com.ezp-02.lirn.net/toc.aspx?bookid=51953
Second, investigate how to devise a white hat plan to penetrate a system.
- Read Chapter 2 - Reconnaissance in The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Second Edition
- Read Section II, Chapters 2 – 6Safety on the Client Script in Web Security:A WhiteHat Perspectivehttp://library.books24x7.com.ezp-02.lirn.net/toc.aspx?bookid=51953
- Read Chapter 3 Information Gathering Techniques in Ethical Hacking and Penetration Testing http://library.books24x7.com.ezp-02.lirn.net/toc.aspx?bookid=61791
- Work through chapters 2 – 6 in Professional Penetration Testing: Creating and Learning in a Hacking Lab, Second Editionhttp://library.books24x7.com.ezp-02.lirn.net/toc.aspx?bookid=56567
Third, apply basics of planning for a white hat penetration by working through the iLabs
- ECSA Certified Security Analyst Course ECSAv9, Module 03 Pre-penetration Testing Steps
- Certified Security Analyst Course ECSAv9, Module 04 Information Gathering Methodology
Task
Now that you better understand the role of a white hat hacker, and how to stay ethical during the penetration scenario, design a plan to carry out a white hat penetration test of a company.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Hello, I have uploaded the final copy. Please review the paper, and let me know in case you need any edits. Thank you for giving me an opportunity to serve you😍 😍
A Plan for Carrying Out a White Hat Penetration Test of a Company
Name
Institution
Professor
Course
Date
PART ONE: SUMMARY OF AN ARTICLE
This article is authored by Chris Hoffman and published on the How-To Geek
technology magazine. Chris is the editor in chief of this magazine. In this article, he provides
a meticulous explanation of each of the three hacker hat colors, which include black hat,
white hat and gray hat. According to Chris, hackers are not intrinsically bad. On the same
note, being a hacker does not mean that an individual is a criminal. This is the reason why
hackers have been classified into different categories depending on the motive behind their
acting activity. Chris clarifies that the work hacker is an ambiguous term that could either be
used for describing an individual who compromises the security of computer systems or a
highly knowledgeable software developer in open-source movements. Each of the different
types of hackers is described below.
Black-Hat Hackers
According to Hoffman (2017), black-hat hacker is the most popular type of hacker.
Most media platforms focus on this type of hacker. These are hackers whose aim is infringing
computer security for their gains. For example, they interfere with the security of a computer
system with the aim of stealing confidential information such as credit card numbers, social
security numbers or even stealing money from an organization. Also, the black-hat hacker
can comprise the security of a computer system for purely malicious purposes. For example,
the black hacker can carry out malicious activity on a system by developing a botnet and
using the same to conduct DDOS attacks against the targeted system. In doing so, they
interrupt the normal functioning or working of the computer system. Besides, they can cause
enormous losses to the targeted organization. Thus, black hats can better be described as
computer criminals.
White-Hat Hackers
They are normally referred to as white hats. This is the perfect opposite of the blackhat hackers. According to Hoffman (2017), white-hat hackers are ethical hackers. They are
whizzes in the hacking of computer systems. However, they use their hacking knowledge and
expertise for legal and ethical purposes instead of felonious and unethical purposes. The
majority of the white hats are hired by firms for purposes of testing organization’s computer
security systems and consequently advising the firm on what needs to be done in order to
toughen the computer security systems. White hats are authorized by firms to try to comprise
their computer systems. They use their ability to penetrate a firm’s computer system not to
sabotage or steal from the firm but to help it to advance its defences. The hac...