Editorial by Yoofi Kpodo

Ethical Hackers

Ethical hackers, also known as white hat hackers, are information security experts who attempt to penetrate a network, application, or any other computer system. Companies will hire and give permission to ethical hackers, to find vulnerabilities which could otherwise be exploited. They help firms know where their security protocol is and is not very effective. In general, they will operate like so: Information gathering> Scanning>Exploitation>Report>Debrief.

Companies with a good knowledge of the methodology, used behind cyberattacks, will be better prepared. They will be more likely to prevent them. Despite how damaging a cyberattack can be, most companies are unprepared or just assume they won’t be a target.

Approach Used

• Scanning tools will be used to test the vulnerability of ports, programmes such as; Nmap, Wireshark will be sued to identify ports

• Testing network and Wi-Fi access (Some companies offer just one Wi-Fi access point for everyone including visitors. Rather than separating visitors and admins from working over the same connection)

• Avoiding detection systems which should otherwise keep/prevent intrusion honeypots, firewalls, IDS

• "Social engineering" techniques such as email phishing, physical approach (imitating a staff member in order to gain access to otherwise restricted areas)

Menu

  • Homepage
  • Social Engineering
  • Evil files/Backdoors
  • Website Hacking
  • Network Hacking
  • Ethical Hackers
  • Highlights

    Social Engineering

    Evil files/Backdoors

    • More

    Get in touch

    If you would like more information or have any questions, please feel free to contact me.

    • Yoofik@hotmail.co.uk