The Ethical Hacker

User Generated

trrmltfq

Computer Science

Description

The Ethical Hacker

Imagine for a moment that you are a hacker — an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged in criminal activity for financial gain as its primary activity. Assume you are not to be concerned with any politics of the job and that your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security. These include firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network topology is located in that same location. Your goal is to infiltrate the security sufficiently to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a paper in which you:

  • Explain your method of attack and operation within reasonable parameters of the law.
  • Discuss specific malware, social engineering, or any other type of attacks you would deploy to achieve your desired goals.
  • Assess the hurdles you expect and how you plan to overcome them.
  • Determine how you would remain anonymous and avoid detection.

Use at least four (4) quality resources in this assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, still working.
Hello,Attached find the completed work together with the plagiarism report. Go through it and in case you need any corrections kindly let me know.All the best.

Running Head: THE ETHICAL HACKER

1

The Ethical Hacker
Name
Institutional Affiliation

THE ETHICAL HACKER

2

The Ethical Hacker
Ethical hacking comprises of formal and methodological penetration testing, read
teaming, vulnerability testing, white hat hacking, intrusion testing, and it utilizes the same tools
which other criminal hackers use but with a main difference, which is the permission granted in
professional setting. Ethical hacker’s major intension is discovering the vulnerabilities from the
attacker’s perspective in order to secure better security. In the case, the main intention of the
ethical hacking is to penetrate in a business network which is believed to be conducting criminal
activities.
This paper will explain the method of attack and operation within reasonable parameters
of the law and elaborate specific malware, social engineer, and other specific types of attacks
which one would be deployed in achieving the desired goals. It will also assess the hurdles
expected and how to plan on overcoming them. Lastly, it will explain how an ethical hacker can
remain anonymous without blowing the cover (Sean-Philip, 2016).
Explain your method of attack and operation within reasonable parameters of the law.
In ethical hacking, the hacker uses the same methods used by criminal hackers in
penetrating into other people’s computers and networks. One of the methods I would apply
includes attacking defaults. Generally, every software and hardware network application within
the market come with various default credentials such as the user name sand the password which
allows an administrative access to the system. One of the main ways to acquire an authorized
access is through exploiting the facts that several administrators of the system do not change
their defaults. SQL injection is another method of devastating attacks against network-based
systems. Currently, various websites comprise of more than just a web server which serves

THE ETHICAL HACKER

3

HTML codes and graphic files to users. An SQL injection attacks happen when the attacker
inputs SQL commands in the areas which are meant for different information such as user names
and search strings and which can be executed to return the database content (Holik, Horalek,
Marik, Neradova & Zitta, 2014).
Exploiting Un-patched services is another method which could be applied to penetrate to
the company’s network. Patching may consume a lot of time, complicated and at times may
result to problems. According to various studies in operating systems, they are said to contain
human errors thus hackers may exploit such chances after manufactures release updated codes to
correct these i...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags