Abstract
Abstract
Abstract
2.TYPES OF HACKING
Website hacking
Centralised to vulnerable loopholes in websites,
collapsing the information or making changes in it.
Email hacking
Computer Hacking
Password hacking
Cybercriminals
Hacktivists
Script kiddies
4. ETHICAL HACKING
Nessus
Aircrack-Ng
The benefit that Aircrack-Ng brings to the table is that it
provides ethical hackers with a range of tools leveraged
for monitoring and evaluating a network. If they find a
vulnerable network, they check, monitor, attack, and
crack it. This Wi-Fi hacking tool spares no
platform and supports 2Free BSD, Solaris, Windows,
OpenBSD, Linux, NetBSD, and OS X.
Nmap
Burp Suite
It is a Java-based system that deals with Web
Penetration Testing. Burp Suite is an industry-standard
suite of tools that information security (InfoSec)
leverage. For ethical hackers, this tool enables them to
identify vulnerabilities in their target system and
confirm if any attack vectors impact web applications.
In addition, Burp Suite has the best web application
crawler that maps functionality and content efficiently.
It also tackles shifts in state, app logins, and volatile
content.
Acunetix
Latest Technologies:-
Containers
Kali NetHunter
Kali Cloud
Applications
Scope Of Work
Instances
9. CONCLUSION
With an increasing number of people using the
internet for banking, communication, shopping, and
business, cyberspace is becoming a money-making
arena for hackers. Hackers use digital means to gain
access to computer systems to purloin data, conduct
fraud, or put a system at risk by destroying documents
and files.
Criminals can access WiFi networks and social
media accounts, such as Instagram, Twitter, and
Facebook. Personal information of users, such as
images, videos, and bank passwords, are all at risk. It
brings to light the fact that the more internet visible a
person is, the more vulnerable he is to criminals or
black hat hackers.
Ethical hacking is the antidote to this problem. In
ethical hacking, a hacker gains access to a system
after seeking permission to discover security flaws.
The rise in online activities worldwide has increased
the demand for certified ethical hackers along with
courses on hacking.
10. REFERENCES
Literature
Websites
• https://www.quora.com/What-is-ethical-hacking-2