IZat Nayab Raj PDF
IZat Nayab Raj PDF
IZat Nayab Raj PDF
Sonali Patil Ankur Jangra Mandar Bhale Akshay Raina Pratik Kulkarni
Associate Professor Computer Department Computer Department Computer Department Computer Department
Computer Department PCCOE, Pune PCCOE,Pune PCCOE,Pune PCCOE,Pune
PCCOE,Pune
Abstract—Hacking is basically expertise in any field. Hackers secure them is keeping secret password for each. The users
are classified as per working and as per knowledge. The ethical feel once they have set a strong password, they are completely
hackers come under white hat hackers. Ethical hackers use secured whereas they are aware of the darker part of this
hacking techniques in order to provide security. They are legally internet. People with intentions to hurt, steal or harm in any of
authorized hackers. Various tools are used in order to carry out the way called as the Hackers (crackers) constitute the darker
hacking. The most common hacking technique used is phishing.
part of this web. They intrude into the system using certain
Since, there is a rapid growth in the number of attack, there is a
need for people to learn ethical hacking concepts to secure techniques. So, here comes the role of Ethical Hacker, the
themselves. good ones. To stay secure from getting hacked most basic
strategy would be to learn to think like a hacker. How the
Keywords—Hacking; White hat Hackers; Ethical Hackers; hacker carry out hacking, what tools and techniques are used
Phishing;
by them. An ethical hacker does the same. He/She knows how
1.INTRODUCTION a hacker can intrude into his/her system, so all the existing
vulnerabilities in his/her system are scanned and removed. A
Ethical hacking also known as penetration testing or white user study by Garfinkel and Miller[1], states that many users
hat hacking, involves the same tools, tricks, and techniques may still be vulnerable inspite of having strong passwords.
that hackers use, but with one major difference that Ethical The future is life bounded in internet hence, security is the
hacking is legal. Ethical hacking is performed with the target’s most important factor to be taken care of. This is why people
authorization. The intent of ethical hacking is to find out should learn ethical hacking.
vulnerabilities from a hacker’s viewpoint so systems can be
better secured. It’s part of an overall information risk 2. ETHICAL HACKING
management program that gives the permission for ongoing
security enhancements. Who is an Ethical Hacker?
Security is the condition of being protected in opposition to An ethical hacker is a white hat hacker who does hacking for
danger or loss. In the case of networks, it is also called the some good cause(like securing any organization ). Ethical
information security. Computer security is required because hackers basically are the good people. They have legal
most organizations can be damaged by antagonistic software authorization to intrude into other's system. The ethical
or intruders. There may be several forms of damage which are hackers scan the ports, websites and find the vulnerabilities
interrelated which are produced by the intruders. through which a cracker can attack.
Types of Hackers:
1) As per working The attacks could be easily done once the vulnerabilities for
any system is known. To be secured in this world of internet,
x White Hat Hackers
you must know how a hacker(cracker) can intrude into your
x Black Hat Hackers
system
x Grey Hat Hackers
x Hactivists Learning the concepts of hacking and applying them for
x State Sponsored Hackers securing any system, organization or for any good cause is
x Suicide Hackers what defines ETHICAL HACKING.
2) As per knowledge The Fig.1 explains the steps for carrying out ethical hacking
x Script Kiddies which consists of 5 blocks –
x Admins
x Coders 1) Reconnaissance
2) Scanning and Enumeration
NEED FOR ETHICAL HACKING: 3) Gaining Access
4) Maintaining Access
The technology of internet of things is growing at rapid rate. 5) Clearing Tracks
Things are getting connected to internet and the only way to
1602
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
1603
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
1604
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
1605
IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI-2017)
5. CONCLUSION
[2]. website:https://www.tutorialspoint.com/ethical_hacking/ethical_ha
cking_reconnaissance.html
Ethical hacking must be practiced. It requires basic knowledge of
networks and cyber security. This paper collaborates most of the [3]. Tom Jagatic, Nathaniel Johnson, Markus Jakobsson, and Filippo
basic terminologies related to ethical hacking. It gives a brief Menczer. Social Phishing. Magazine Communications of the
information about who an ethical hacker is, and why there's a need ACM
for world to learn it. It also describes how hacking is carried out and
[4]. Website:http://www.digit.in/technology-guides/fasttrack-to-cyber-
what are the different tools and technologies used.
crime/the-12-types-of-cyber-crime.html
Thus, this paper gives a basic understanding in context of ethical
hacking. [5]. Aaron Emigh. Online identity theft: Phishing technology,
chokepoints and countermeasures. ITTC Report on Online Identity
Theft Technology and Counter measures; http://www.anti-
6. REFERENCES phishing.org/Phishing-dhs-report.pdf, October 2005.
[1]. Simson Garfinkel and Robert Miller. Johnny 2: A user
test of key continuity management with s/mime and outlook
express. Symposium on Usable Privacy and Security (SOUPS
2005), July 6-8, 2005, Pittsburgh, PA.
1606