Basic Question and Answer of Ethical Hacking – IT Security

how to prevent hacking in linux

Here are the Top 25 Basic Questions and their Answer of Ethical Hacking – IT Security. Ethical Hacking interview questions to help you prepare for the job interview. In this list of Ethical Hacker interview questions, we have covered all commonly asked basic and advanced hacking interview questions. Read this also Understanding the Steps of … Read more

Unix and Linux Enumeration

Linux and Unix systems are no different from Windows systems and can be enumerated as well. The difference lies in the tools and the approach. In this section you will take a look at a handful of the tools that have proven useful in exploring these systems. finger The finger command is designed to return … Read more

Checking for Live Systems

How do you check for live systems in a targeted environment? There are plenty of ways to accomplish this. Some common ways to perform these types of scans are: ■ Wardialing ■ Wardriving ■ Pinging ■ Port scanning Each of these techniques, along with others we will explore, offers something that the others don’t, or … Read more

Understanding the Steps of Ethical Hacking

For an overview of the process, let’s look at the steps of ethical hacking to see where foot-printing fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject of this article. This phase consists of passively gaining information about … Read more

pen test logic

A pen test is the next logical step beyond ethical hacking. Although ethical hacking sometimes occurs without a formal set of rules of engagement, pen testing does require rules to be agreed on in advance in every case. If you choose to perform a pen test without having certain parameters determined ahead of time, it … Read more

Ethical Hacking and Penetration Testing

Ethical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking, most tend to use the term pen tester, which is short for penetration tester. Pen testers do simply that: penetrate systems like a hacker, but for benign purposes. As an ethical hacker and future test … Read more

Understanding Linux Vulnerabilities

Vulnerabilities    and    attacks    against    Linux    are    creating    business    risks    in    a    growing number    of    organizations    —    especially    e-commerce    companies,    network    and    IT/security vendors,    and    cloud    service    providers    that    rely    on    Linux    for    many    of    their    systems, including    their    own    products.    When    Linux    systems    are    hacked,    the    victim organizations    can    experience    the    same    side    effects    as   … Read more

Understanding the Implications of Wireless Network Vulnerabilities

Wi-Fi    is    very    susceptible    to    attack    —    even    more    so    than    wired    networks    if    it’s    not    configured    or    deployed    properly.    Wireless    networks    have    long- standing    vulnerabilities    that    can    enable    an    attacker    to    bring    your    network    to    its    knees    or allow    your    sensitive    information    to    be    extracted    right    out    of    thin    air.    If    your    wireless network   … Read more

Putting Up General Network Defenses

Use    stateful    inspection    rules    that    monitor    traffic    sessions    for    firewalls.    This    can help    ensure    that    all    traffic    traversing    the    firewall    is    legitimate    and    can    prevent    DoS attacks    and    other    spoofing    attacks. Implement    rules    to    perform    packet    filtering    based    on    traffic    type,    TCP/UDP ports,    IP    addresses,    and    even    specific    interfaces    on    your    routers    before    the    traffic   … Read more

Identifying Basic Physical Security Vulnerabilities

Whatever    your    computer-    and    network-security    technology,    practically    any    hack    is possible    if    an    attacker    is    in    your    building    or    data    center.    That’s    why    looking    for physical    security    vulnerabilities    and    fixing    them    before    they’re    exploited    is    so important. In    small    companies,    some    physical    security    issues    might    not    be    a    problem.    Many physical    security    vulnerabilities    depend    on   … Read more