"If you know the enemy and know yourself, you need not fear the result of a hundred battles." - Sun Tzu, Art of War
*
Ethical hackers tries to answer:
o
What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking)
o
What can an intruder do with that information? (Gaining Access and Maintaining Access phases)
o
Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases)
*
If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend in order to gain protection.
..................................................................................................................................................................... .....................................................
Saturday, 26 February 2011
// //
0
comments
//
0 comments to "What do Ethical Hackers do?"
Total Pageviews
Blog Archive
-
▼
2011
(43)
-
▼
February
(28)
-
▼
Feb 26
(19)
- Anonymizers- Make your web surfing anonymous
- What is Proxy?
- Cheops-Network management tool-equivalent of a Swi...
- Passive Fingerprinting
- Active Stack Fingerprinting: This technique is cal...
- Tool: Super Scan - Port scanner
- Tool: Net Scan Tools Pro
- Ethical Hacker and Scanning Tools
- What is Nslookup?
- Footprinting - Attack Methods
- What is Footprinting?
- Hacker Classes - Black hats, White Hats, Gray Hats,
- Hacking Phase 5 - Covering Tracks
- Hacking Phase 4 - Maintaining Access
- Hacking Phase 3 - Gaining Access - The hacker expl...
- Hacking Phase 2 - Scanning
- Hacking Phase 1 - Reconnaissance
- Hacktivism
- What do Ethical Hackers do?
-
▼
Feb 26
(19)
-
▼
February
(28)



Post a Comment