Famous Hackers

Jonathan James Jonathan James was an American hacker. He is the first Juvenile who send to prison for cybercrime in the United States. He committed suicide on 18 May 2008, of a self-inflicted gunshot wound. In 1999, at the age of 16, he gained access to several computers by breaking the password of a NASA … Read more

Disadvantages of Ethical Hacking

As with all types of activities which have a darker side, there will be…..dishonest people presenting drawbacks. The possible drawbacks of ethical hacking include: The ethical hacker using the knowledge they gain to do malicious hacking activities Allowing the company’s financial and banking details to be seen The possibility that the ethical hacker will send … Read more

The Advantages of Ethical Hacking

Testing Security Measures The primary advantage of having ethical hackers on a company’s payroll is that the hackers are allowed to test a company’s security measures in a controlled, safe environment. These hackers can help companies determine which of their computer security measures are effective, which measures need updating, and which ones pose little to … Read more

TYPES OF HACKING

One of the most frequent threats of hacking is those faced by the websites. It is very common to see a particular website or online account being hacked open intentionally using unauthorized access and its contents being changed or made public. The web sites of political or social organizations are the frequent targets by groups … Read more

HOW VULNERABILITIES ARE IDENTIFIED

Vulnerabilities need to be identified by both the penetration tester and the vulnerability scanner. The steps are similar for the security tester and an unauthorized attacker. The attacker may choose to proceed more slowly to avoid detection, but some penetration testers will also start slowly so that the target company can learn where their detection … Read more

PENETRATION TESTING VS VULNERABILITY ASSESSMENT

There is often some confusion between penetration testing and vulnerability assessment. The two terms are related but penetration testing has more of an emphasis on gaining as much access as possible while vulnerability assessment places the emphasis on identifying areas that are vulnerable to the attack. An automated vulnerability scanner will often identify possible vulnerabilities … Read more

PENETRATION TESTING APPROACH

Develop a penetration test plan Establishing the test ground rules is a particularly important part of penetration analysis. The rules are captured in the penetration test plan, which defines the test objective, the product configuration, the test environment, test resources, and schedule. It is important that penetration testing use ethical evaluators who are no antagonistic … Read more