Free

Ethical Hacking - Essay Example

Comments (0) Cite this document
Summary
Scanning is the deliberate process of trying to access the systems to get a response, while enumeration collects additional in-depth information to ensure the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Ethical Hacking
Read TextPreview

Extract of sample "Ethical Hacking"

Scanning and enumeration tools 4 September Scanning and Enumeration Scanning and enumeration compose the second pre-attackphase, the active part of gathering information about the target. Scanning is the deliberate process of trying to access the systems to get a response, while enumeration collects additional in-depth information to ensure the success of attack (The Ethical Hacker Network, 2012).
Intrusion Detection System
An Intrusion Detection System (IDS) is a system that oversees network traffic or host audit logs to recognize violations in system security (Information Assurance Technology Analysis Center (IATAC), 2009, p.3). It identifies these violations and notifies the administration of malevolent activities within the system. It can be used to protect an organization against an attack because it spots out and potentially prevents intrusions that breach the system’s firewalls or those that occur behind the local area network (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations real-time or near-real-time monitoring of a host or a network and defend them from hacking.
IDS and Detection of Footprinting stages
IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds: false positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is not recognized by the IDS (IATAC, 2009, p.4). When this happens, hackers’ footprinting efforts can enter the system and evade the systematic monitors of an IDS. Also, an IDS cannot evade successful social engineering tactics. These tactics gathers useful information about the system that can be used to determine vulnerabilities and other useful information.
Scanning and Enumeration Tools
Two scanning and enumeration tools that the organization can use are Port Scanning and Null Session tools. Port scanning can be done by Nmap- it is a program made for network mapping tool. Nmap does different network functions, such as fingerprinting a system, finding ports that are common to a specific network device, and determining the servers, such as recognizing that System B is actually a Solaris server. The Windows Server Message Block (SMB) protocol provides free information. Null Sessions are not on by default in Win XP, Server 2003, Vista, and Windows 7 but open in Win 2000 and NT. Some of the Null Session Tools are Dumpsec, Winfo, Sid2User, and NBTenun 3.3.
Tools That Take Scanning and Enumeration to the Next Level and Report Vulnerabilities
Scanning and enumeration can be taken to the next level through using vulnerability assessment tools that respond to scanning and enumeration activities. Vulnerability assessment tools usually work by trying to mechanize the steps often employed to develop vulnerabilities: they start by doing “footprint” analysis to find out what network services and/or software programs (as well as versions and patch levels) run on the target (IATAC, 2011, p.8). The tools then try to determine the indicators (patterns, attributes) of, or to take advantage of vulnerabilities that are in the system and to inform the administration of its findings (IATAC, 2011, p.8). Nearly all vulnerability assessment tools apply at least some intrusive “scanning” techniques that engage locating a probable vulnerability (frequently through passive scanning), then inserting either random data or fake attack data into the “interface” made or shown by that vulnerability, and then studying the results (IATAC, 2011, p.8).
References
Information Assurance Technology Analysis Center (IATAC). (2011). Vulnerability assessments. Retrieved from http://iac.dtic.mil/iatac/download/vulnerability_assessment.pdf
_____(2009). Intrusion detection systems. Retrieved from http://iac.dtic.mil/iatac/download/intrusion_detection.pdf
The Ethical Hacker Network. (2012). CEH: Exam prep 2 - Technical foundations of hacking. Retrieved from http://www.ethicalhacker.net/content/view/50/2/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethical Hacking Essay Example | Topics and Well Written Essays - 500 words - 3”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1602208-ethical-hacking
(Ethical Hacking Essay Example | Topics and Well Written Essays - 500 Words - 3)
https://studentshare.org/miscellaneous/1602208-ethical-hacking.
“Ethical Hacking Essay Example | Topics and Well Written Essays - 500 Words - 3”, n.d. https://studentshare.org/miscellaneous/1602208-ethical-hacking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ethical Hacking

Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending...
5 Pages(1250 words)Research Paper

Systems Security/Ethical Hacking

...of the organization should not focus on Information technology only. Some of the sources of threats includes vandalism, sabotage, espionage, natural disasters, online frauds, phishing etc. however, cyber criminals can also compromise networks while data in transit. Some of the threats are non-ethical hacking, viruses, Trojan, malicious codes, and denial of service attacks. 1.5.1 Success Factors Critical success factors for the effective and successful application of security within Gold Star are: Complete and comprehensive security policy, security objective that aligns with Gold Star business objectives A methodology that is steady and aligns with Gold Star culture Comprehensively Visible Senior...
12 Pages(3000 words)Essay

Ethical hacking

...? 245CT: Ethical Hacking Word Count: 2,000 (8 pages) 245CT Ethical Hacking Lab Book work) Session 11 - Semester 2 Sur First Name: SID: Lab Day: Wednesday Lab Time: Lab: 11.00 – 13.00 AS236 & ASG22 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! Index 245CT: Ethical Hacking 1 1 245CT 2 Ethical Hacking 1 2 Lab Book (Coursework) 2 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! 2 Index 3 Coursework 4 Lab 2 - Essential TCP/IP tools 5 Note: Use right-click/Update Field/Update Entire Table/OK to refresh the index above...
8 Pages(2000 words)Coursework

Is There Such a Thing as Ethical Hacking

...? Ethical Hacking Introduction The term hacker has more than one meaning in the industry of information technology, hacker is considered a computer operator who gives preferences to gaining additional and far stretched information about computer systems and the information he gains is more than what an average computer system user has. Another definition of hacker states that, hacker is an individual who is continuously involved in the part of creating programs and conducted tasks recognized as programming and does not only theorize about these tasks. As computer systems came into existence, the number of users even increased period after period and the ways of programming even elevated and new ways were...
8 Pages(2000 words)Essay

Ethical Hacking Final Challenges

...? ETHICAL HACKING Challenge The MD5 selected by the CA as the hashing algorithm for creating digital signatures has its own vulnerabilities. First, MD5 is unsecure given that it does not posses the ability of generating unique identifiers of a fixed size with the ability of blocking data of arbitrary size. A secure hash algorithm must posses the ability of the unlikely of producing two different inputs to the algorithm of generating the same digest. The moment in which an algorithm is able to produce the same digest for two different blocks of data otherwise referred to as collision resistance. Therefore one of the vulnerabilities of MD5 is its possibility of resulting into collision attacks. The...
4 Pages(1000 words)Research Paper

Ethical Hacking

...? Ethical Hacking Ethical issues have been raised concerning the use of hackers to secure the network systems of companies, from other hackers with malicious intent. Some have argued that the ethical issues concerned are not related to the hacking itself but vary according to what the different members of the society may think. It is a situation where ethics are judged, not by the universal definitions concerning hacking, but according to the society within which the use of ethical hackers has become commonplace. Introduction Ethical hacking describes the procedure where...
5 Pages(1250 words)Research Paper

Ethical Hacking

...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is justified, provided...
2 Pages(500 words)Essay

Social Engineering (ethical hacking )

...Ethical Hacking – Part I Table of Contents Table of Contents Introduction 2 Literature Review 3 Analysis 5 Works Cited 8 Introduction Since its beginning in the year 1996 until today, the internet has been successful in establishing an enormous network of millions of computers across the seven continents. In addition, the internet has now not remained a single network (Erickson, pp. 23-25); however, has now become a platform of gathering different networks that allow individual computers to connect with them in a number of ways such as through dial-ups, gateways, ISPs, etc. In other words, only a computer and network connection are the two major requisites for entering into the world of internet that has...
8 Pages(2000 words)Essay

Ethical hacking

... Press. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., & McDaniel, P. (2010, December). Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 107- 116). ACM. Wilhelm, T. (2013). Professional Penetration Testing: Creating and Learning in a Hacking Lab (Vol. 1). Newnes.... [Penetration testing documentation] By Introduction The Xen show of virtual machines offered our understudies serverautonomy giving every learner control of a neighborhood arrangement and of a remarkable IP address on the "virtual" system for each one server so that people could work in groups, incorporating in separation taking in circumstances, and...
8 Pages(2000 words)Essay

Managerial Applications of Technology (Ethical Hacking)2

...Managerial Applications of Technology (Ethical Hacking) As their goes, ethical hackers are hackers who comply with the expectations of an organization, thus cannot breach their operation codes (Hafelee, 2004). This means that their actions can be ethical and still effective in that they secure an organization’s IT system by detecting their faults and strengthening them. In securing their information systems, managers have to consider factors such as the sensitivity of the information (say like employees’ private data), who the information is being revealed to (the hacker), the potential reactions that may result if the information leaks, and finally the credibility of the...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Ethical Hacking for FREE!

Contact Us