StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Hacking Techniques - Essay Example

Cite this document
Summary
The essay "Ethical Hacking Techniques" focuses on the critical analysis of the major issues in ethical hacking techniques. Scanning and enumeration compose the second pre-attack phase, the active part of gathering information about the target…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Ethical Hacking Techniques
Read Text Preview

Extract of sample "Ethical Hacking Techniques"

It identifies these violations and notifies the administration of malevolent activities within the system. It can be used to protect an organization against an attack because it spots out and potentially prevents intrusions that breach the system’s firewalls or those that occur behind the local area network (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations with real-time or near-real-time monitoring of a host or a network and defend them from hacking.

IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds: false positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is not recognized by the IDS (IATAC, 2009, p.4). When this happens, hackers’ footprinting efforts can enter the system and evade the systematic monitors of an IDS. Also, an IDS cannot evade successful social engineering tactics. These tactics gather useful information about the system that can be used to determine vulnerabilities and other useful information.

Two scanning and enumeration tools that the organization can use are Port Scanning and Null Session tools. Port scanning can be done by Nmap- it is a program made for network mapping tools. Nmap does different network functions, such as fingerprinting a system, finding ports that are common to a specific network device, and determining the servers, such as recognizing that System B is a Solaris server. The Windows Server Message Block (SMB) protocol provides free information. Null Sessions are not on by default in Win XP, Server 2003, Vista, and Windows 7 but open in Win 2000 and NT. Some of the Null Session Tools are Dumpsec, Winfo, Sid2User, and NBTenun 3.3.

Scanning and enumeration can be taken to the next level by using vulnerability assessment tools that respond to scanning and enumeration activities. Vulnerability assessment tools usually work by trying to mechanize the steps often employed to develop vulnerabilities: they start by doing a “footprint” analysis to find out what network services and/or software programs (as well as versions and patch levels) run on the target (IATAC, 2011, p.8). The tools then try to determine the indicators (patterns, attributes) of, or to take advantage of vulnerabilities that are in the system and to inform the administration of its findings (IATAC, 2011, p.8). Nearly all vulnerability assessment tools apply at least some intrusive “scanning” techniques that engage in locating a probable vulnerability (frequently through passive scanning), then inserting either random data or fake attack data into the “interface” made or shown by that vulnerability, and then studying the results (IATAC, 2011, p.8).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethical Hacking Essay Example | Topics and Well Written Essays - 500 words - 3”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1602208-ethical-hacking
(Ethical Hacking Essay Example | Topics and Well Written Essays - 500 Words - 3)
https://studentshare.org/miscellaneous/1602208-ethical-hacking.
“Ethical Hacking Essay Example | Topics and Well Written Essays - 500 Words - 3”, n.d. https://studentshare.org/miscellaneous/1602208-ethical-hacking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical Hacking Techniques

Ethics in Cyberspace

ethical hacking is help because it enables ethical hackers to create vital programs that are useful.... This essay discusses ethics in a modern cyberspace and issue of cybercrime, that is among the ethical concerns that have created a dilemma in the contemporary world.... The researcher discusses the topic from an ethical perspective....
5 Pages (1250 words) Essay

Phenomenon of Ethical Hacking

This report "ethical hacking" discusses the term hacker that has more than one meaning in the industry of information technology, hacker is considered a computer operator who gives preferences to gaining additional and far stretched information about computer systems and the information.... uring the early days of hacking, the term hacker was referred to as a person who has great skills, so different terminologies were invented to differentiate between hackers who use this skill to conduct destructive activities and those who don't commit too much damage....
7 Pages (1750 words) Report

The Ethical Hacking Issues

Therefore, there is a need for computer science students to advance their Ethical Hacking Techniques to fight against the increasing problems of criminal hacking.... The paper "The ethical hacking Issues" highlights that there is a need for future research to offer an adequate analysis of the way ethical hackers will implement effective risk management plans, which will enable Internet users or businesses to protect their data from hacking activities.... It included literature materials in order to examine the way the previous scholars have argued about ethical hacking issues....
5 Pages (1250 words) Research Proposal

How Hacking Can Be Helpful

Admittedly, many people negatively use hacking techniques to break into computer systems and the privacy of others without the parties' knowledge.... Although the concept of ethical hacking can be helpful for companies to improve their security levels, today hacking techniques are widely used for supporting illegal purposes like credit card fraud and information theft.... Today it is not necessary for one to sit the whole day at a computer to break into the security of an organization because there have been many simple techniques in use....
12 Pages (3000 words) Essay

Anti hacking techniuqes

This report "Anti-hacking techniques" discusses the security of a system as dependent on the users and the ISP.... This includes cyber-stalking, identity thefts, malicious software, child abuse, and soliciting, and finally, hacking [1].... One of the stated cybercrime which is very popular is hacking.... hacking is caused by the desire of a hacker to get access to information without being authorized.... hacking is caused by the desire of the hacker to steal personal information from other internet users and use it for his/her own advantage....
7 Pages (1750 words) Report

Ethical versus Unethical Hacking

The paper "Ethical versus Unethical hacking" highlights that the boundary between ethical and unethical hacking is slim, and it calls for qualities such as trustworthiness to ensure that system administrators do not use sensitive information maliciously.... hacking is a popular term today for all the wrong reasons, which include cybercrime, system intrusion, and security breaches.... As such, the relevance of hacking is something that not only considers an individual hacker but entire corporations, or national security apparatus....
10 Pages (2500 words) Research Paper

The Impact of Hacking in Todays Firms

This paper will define hacking, discuss the types and techniques of hacking, and give examples of companies that have been hacked.... hacking is an activity that is a major concern for many organizations.... This paper tells that hacking is frequently perceived as a form of computer crime.... hacking entails amending features of a computer system to perform a different function that the computer was not intended for.... hacking is not limited to computers, but can also be performed on other electronic devices such as mobile phones....
6 Pages (1500 words) Term Paper

Teaching Hacking as a General Subject

This term paper "Teaching hacking as a General Subject" proposes an analysis of whether hacking can be considered a general subject.... The paper provides an analysis of the benefits of training students about hacking in comparison to the context of failing to implement the program as a general lesson.... Training students about hacking is an advantage to the public.... The purpose of the report is to propose an analysis of whether hacking can be considered a general subject....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us