Tuesday, June 1, 2010

Ethical Hacking

Something that I want to share about Ethical Hacking.

Introduction to Ethical Hacking.


  • It is a part of your ongoing security Architecture.
  • It is an art and science of determining the vulnerabilities of your information infrastructure to better defend, used to determine the weaknesses in your network BEFORE the real hackers do!
  • It is been performed by highly skilled, ETHICAL security professionals (We also know them as White Collared Hackers), uses the same techniques and tools to find the weaknesses and mitigate them or defend against them.

Types of Ethical Hacking

  • White Box: You have FULL knowledge of the network
  • Black Box: You have NO knowledge of the infrastructure
  • Gray Box: You have some knowledge of the network

Assessment Testing:
  • Vulnerability Assessment, using an automated tool to identify weaknesses or vulnerabilities in a network
  • Penetration testing, Comprehensive review of vulnerabilities, how to exploit them, how network reacts to them

some more details will be added soon....


No comments:

Post a Comment

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.Please don't spam,spam comments will be deleted upon reviews.