Home | About | Our Publication | Pioneer IT Journal | The Ethical Hacking: An Extensive Study

The Ethical Hacking: An Extensive Study

Font size: Decrease font Enlarge font
Today more and more software are being developed and people are getting more and more options in their present software‘s. But many are not aware that they are being hacked without their knowledge. One reaction to this state of affairs is a behavior termed ―Ethical Hacking" which attempts to proactively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. A good ethical hacker should know the methodology chosen by the hacker like reconnaissance, host or target scanning, gaining access, maintaining access and clearing tracks. For ethical hacking we should know about the various tools and methods that can be used by a black hat hacker apart from the methodology used by him. From the point of view of the user one should know at least some of these because some hackers make use of those who are not aware of the various hacking methods to hack into a system. Also when thinking from the point of view of the developer, he also should be aware of these since he should be able to close holes in his software even with the usage of the various tools. With the advent of new tools the hackers may make new tactics. But at least the software will be resistant to some of the tools.