Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

/ Essays / Communications

Print

Disclaimer: This work has been submitted by a student. This is not an example of the work produced by our Essay Writing Service. You can v

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect th

Chapter 1
Introduction
Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a n
completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools av
organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secur
Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure
efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avoid attacks on the n
over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which
and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical hackers
an organization. Using hacking techniques for handling employees in organization and for solving critical judicial cases is not a crime. An ethic
main aspect in ethical hacking is that target permission is essential for performing hacking on the information. Ethical hacking can be used wh
ethical hacking can help in testing the networks by finding out various vulnerabilities. In ethical hacking, a user will get permission to access th

Aims and Objectives


Aim
To investigate the importance of ethical hacking and its implementation in organizations

Objectives
Finding the importance of ethical hacking tools
Understanding the ethical hacking process
Implementing ethical hacking tools in an organization

Purpose of Study
The main of this research is to recognize ethical hacking tools that can be used in organizations and government agencies. Testing the networ
The difficulties in networks have to be recognized by the security professional so that they can be solved before effecting the organization ope
ethical hacking tools in a particular organization. The advantages of using ethical hacking in business firms can be evaluated by this study. Eth
security professionals can be efficient in ethical hacking tools by undergoing a training process. Another major intension of this research is to
the networks. (Nina Godbole, 2008). Thus, this research entirely focuses on ethical hacking tools which can be implemented for testing the net

Research Context
This research on ethical hacking can be very useful to many organizations as it can provide clear idea about hacking tools. Security profession
importance of ethical hacking while solving many judicial cases can be identified with the help of this research. Management of an organizatio
implementation process can be understood with the help of this research (Ronald L. Krutz and Russell Dean Vines, 2007). Network security or
hacking methods and techniques that are available in the present market by concentrating on this research. The concepts in this study provide
data in order to use it for the purpose of evaluating a correct process. Management has to take precautionary measures while allowing the pro
Scholars who concerned with information security can take the help of this study for attaining the knowledge on hacking systems. Many organ
business operations effectively. Email systems, data bases and communication applications can avoid or identify attacks by adopting the hack
implementing this research while using ethical hacking tools. The organizations that concerned with security in networks have to use ethical h
discussion it can be understood that, business firms, investigating agencies, government systems and web users can make use of this researc

Chapter 2:Literature Review


Ethical Hacking and its importance
The word hacking is defined as an illegal use of the other’s computer system or the network resources. Hacker is the term which is formerly m
United States and many other countries. The word hacker refers to the names of the persons who enjoys the work in learning the details of the
2006). The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to t
field it make use of the hacking skills for the unlawful purposes like email id, intruding into other’s system. Hacking is of different types such as
anarchists, crackers, kiddies and ethical hacking (Kevin Beaver, 2010). In the types of hacking system one of the most common hacking is ethi
customer’s networks, information assets and identifies the vulnerabilities to maintain the reputation of the corporate sectors before it exploit th
customer’s methodologies and techniques to yield high qualities of infrastructures. The ethical hacking system includes some of the service li
Application Testing
War Dialing
Network Testing
Wireless Security
System Hardening

Application Testing
This is an uncover design or the logic flaws which result in the compromising with the unauthorized accessing of the systems, networks, applic
used for investigating and identifying the extent and the criticality of the problems exposure to the thick client (Java) and thin client (web brow
application testing and web application testing’s (Joel Scambray, Mike Shema and Caleb Sima, 2006). The client-side application testing is the
integrated security into the client software constituents. In this system this testing application is based on the gathering of the information by

War Dialing
This is one of the services that are provided by ethical hacking. War dialing is a method of dialing a modem number to identify open modem co
particular system (Kimberly Graves, 2007). This word is originated from the day the when the internet has come into the existence in most of th
network connection. The tools of War dialing work on the concept that organizations do not pay attention to dial-in ports like they do towards t

Network Testing
The networking testing services of the ethical hacking provides the information on the exposures of the network, services, and solutions on the
network technologies. This testing process includes a number of constitutes in external and internal devices. It also analyzes the applications
(Greg Meyer and Steven Casco, 2002). The main goal of the network testing application is to make obvious demonstration of the political effec
it provides a complete enlightenment to the work for determining the result in the organization.

Wireless Security
Wireless security services measures the security in the available architecture to provide a guidelines to ensure the system integrity and access
phases. In the first phase of the operation it identifies the activeness of the wireless networks (Cyrus Peikari and Seth Fogie, 2003). The team o
space in the wireless network. In the seconds phase of this system it implements a normal users to evaluate the measures of the security that
devices. During the third phase the team will try to utilize the discovered threats to gain access on other networks. This provides the security in
and wireless public key infrastructure.

System Hardening
The system hardening stresses on the network vicinity. Security is the prime factor that determines the level of integrity of the information and
unauthorized, accidental disruption if resources in information technology (Kevin Beaver and Peter T. Davis, 2005). The system hardening asse
analyze the network to identify the loop holes in security updates and other frequent security defects. Scanning of the remote access devices i
missing security updates are determined in the initial phase. In the second step the host operating system is examined to determine the servic
and also the Telnet, FTP, Send-mail, DNS and others are tested (James S. Tiller, 2005). The packet fragmenting and loose source routing are us
complicated as the team uses the information gathered from the first two steps to mine the weaknesses and threats that were identified to ga
for actions and events are determined. Hence from the above context it can be stated that ethical hacking is a methodology that is used for ga
hired by an organization to solve the problems related to hacking in their network and computer system.

Need for Ethical Hacking


The process of employing someone to hack ones company is ethical hacking. Ethical hacking is one of the tools that are used to judge the sec
red teaming, intrusion testing, vulnerability and even security judgments. Each one these has different meanings in different countries. Hacking
code. It makes them better and more efficient (James S. Tiller, 2005). Ethical hacker can know the details of computer while hacking and beco
the secured information. Ethical means a philosophy with morality. Hackers hack systems to detect dangerous, unauthorized access and misu
and vulnerability are the two dangers the hacker has to face. The hacking report must be confidential as it should face the organizations secur
and loss. For example: computer crime is done by misuse of their hacking skills. The need to hack is for catching the thief. Ethical hacking is th
Ethical hacker needs higher level skills compared to penetration testing. Penetration testing is same as ethical hacking but the hacker uses the
“White Hat” in some of the literature. It tests both the security and protective issues whereas penetrating test mainly leads with the security iss
and companies offer the training, but they cannot be created they are self-made. Various types of testing need different types of software’s and
will discover many ways to hack like trial and error method, operating systems, online and determining the threats. Ethical hacking is done by h
personal use (Debra Littlejohn Shinder and Micheal Cross, 2008). Cyber terrorism includes common hacking techniques such like viruses, ema
owner’s request. Mainly this is seen in corporate companies and organizations. Ethical hacking techniques are used for game cheat codes, hac
terrorism and to take preventive action on hackers

Types of ethical hackings


Ethical hackers use various methods for breaking the security system in the organizations in the period of cyber attack. Various types of ethica

Remote Network: This process in especially utilized to recognize the attacks that are causing among the internet. Usually the ethical hacker al
then are firewalls, proxy etc.
Remote dial up network: Remote dial up network hack identify and try to protest from the attack that is causing among the client modern pool
called war dialing for the representative dialing. Open system is one of the examples for this type of attacks.

Local Network: local network hack is the process which is used to access the illegal information by making use of someone with physical acce
hacker should ready to access the local network directly.

Stolen Equipment: By making use of the stolen equipment hack it is easy to identify the information of the thefts such as the laptops etc. the in
graves, 2007). Information like username, password and the security settings that are in the equipment are encoded by stealing the laptop.

Social engineering: A social engineering attack is the process which is used to check the reliability of the organization; this can be done by ma
the data which can be used in the attacks (Bryan Foss and Merlin Stone, 2002). This method is especially utilized to know the security informa

Physical Entry: This Physical entry organization is used in the organizations to control the attacks that are obtained through the physical prem
the ethical hacker can increase and can produce virus and other Trojans directly onto the network.

Application network: the logic flaws present in the applications may result to the illegal access of the network and even in the application and

Network testing: In this process it mainly observes the unsafe data that is present in the internal and the external network, not only in the parti
technologies

Wireless network testing: In this process the wireless network reduces the network liability to the attacker by using the radio access to the giv

Code review: This process will observe the source code which is in the part of the verification system and will recognize the strengths and the

War dialing: it simply identifies the default information that is observed in the modem which is very dangerous to the corporate organizations.

Techniques and tools required for ethical hacking


Ethical hacker needs to understand how to find the network range and subnet mask of the target system. IP addresses are used to locate, scan
geographical location of target system. This can be done by tracing the messages that are sent to destination and the tools used are tracerout
2007). Ethical hacking should use right tools or else task accomplishment of task effectively is difficult. Many security assessment tools will p
attacks. In case of tests in case of physical security assessments they miss weakness. In order for ethical hacking specific tools have to be us
are used. The right tool must be used at right place. The characteristics in tools for ethical hacking is it should have sufficient document, detail
explosion, Updates and support. The general tools used for ethical hacking in case to find passwords are cracking tools such as LC4, John the
The general tools like port scanner like SuperScan cannot be used to crack passwords. The Web-assessment tools such as Whisker or WebIns
analyzer tools such as ethereal cannot give good results. While using the tools for any particular task it is better to get feedback from the simp
Itsecurity.com will give nice feedback from the other security experts which makes ethical hacking easy and to select the right tool. Some of th
Mapper), Etherpeek, SuperScan, QualysGuard, WebInspect and LC4, LANguard Network Security Scanner, Network Stumbler and ToneLoc. The
as SATAN (Security Administrator Tool for Analyzing Networks) and Nmap. The other popular tools used in ethical hacking are Internet scanne
able is a ethical tool used for recovery of windows UNIX problems. This is only password recovery tool handles an enormous variety of tasks. I
passwords using Dictionary and Cryptanalysis, recording VoIP conversations, decoding scrambled passwords, revealing the password boxes, u
fantastic open source tool used as network protocol for UNIX and Windows. It allows examining the data which is present in disk or file and ca
features which have very rich display filter language and ability to view the TCP session. Another cracking tool Aircrack is the fastest available
2009). Thus proper tools and techniques has to be used for better hacking and it will be easier by using more and more tools required.

Hacking operating system


Linux is the operating system which is most useful software that supports and will be helpful to identify the passwords and uses in detecting i
security tools are used for the Linux. The tools which are using in this are not harmful tools this is especially used to protect.

John the ripper: John the ripper is nothing but password hacking software technique which is usually used to develop for the UNIX operating s
it joins all password crackers into single package and the auto detects password hash types which involves the customizable cracker (Ryan, D
password methods which involves various crypt password hash forms where usually found on the different UNIX operating systems that is bas
passwords are placed in the LDAP and other tools. Various types of components are used to expand the capability and for involving the MD4 re
protect the network. It is especially used to identify the network related services on the computer network by generating the map of the networ
instead of this it never advertises its service detection protocol (James turnbull, 2005). However the Nmap can collect many details regarding
are the software products that are used to execute the service, and are used to involve on the local area networks and also on the dealer of the
important operating system and the windows are the second most important operating system. The other operating system used is Nessus, th
identify the virus on the tested system such as; the virus will permit the data on to the network (Mark Carey, Russ Rogers, Paul Criscuolo and m
This software is also called as the external tool which is used to launch the attack. By making use of the mangled packets rejection of the serv
virus. Many organizations through out the world are using this software. The check Rootkit is the normal program which helps the administrato
program is the shell script by using the LINUX tools similar to the strings and the grep commands to seek out to carry out the core programs fo
inconsistency. This program alternatively use own commands to run. This tool will permit check rootkit to get confident the commands upon w

Applications and resources


Ethical hacking is nothing but the one which performs the hacks as security tests for their systems. Ethical hacking can be used in many applic
includes Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) applications are most frequently attacked because mo
programs from the Internet. Malicious software includes viruses and Trojan horses which take down the system. Spam is a junk e-mail which c
carry the virus, so ethical hacking helps to reveal such attacks against in computer systems and provides the security of the system. The main
the main purpose of present business organization (BT, 2008). Ethical hacking has become main stream in organizations which are wishing to
hacking plays important role in providing security. Resources are the computer related services that performs the tasks on behalf of user. In Et
Tiller S, 2005). The ethical hacking has advantages of gaining access to an organizations network and information systems. This provides the
security to the high level attacks such as viruses and traffic trough a firewall. This has been providing the security for various applications whic
software. This includes hacking specific applications including coverage of e-mails systems, instant messaging and VOIP (voice over IP). The
performing the hacking process are Routers, Firewalls, Network infrastructure as a whole, wireless access points and bridges, web application
PCs, Mobile devices, client and server operating systems, client and server applications (Kevin Beaver, 2007). Ethical hacking tests both the sa
Chaitanya, 2008). Hence from the above context it can be stated as the ethical hacking is important in the present scenario as providing secur
hacking can be easily done in this case.

Problems
Ethical hacking is the backbone of network security. The basic problems with this is trustworthiness of the Ethical hacker because let’s take an
security for the bank financial issues if the person is not trust to believe this is not safe as the person only considered as thief. Sometimes the
case hiring professionals is very expensive and the organization need to spend a lot on this (Ethical Hacking, 2009). Ethical hacking is just the
must be kept confidential because they highlight the organizations security risks and attacks. If this document has been falls into the wrong ha
here is the entire information of the organization will be in hands of wrong person and which leads to the loss of the company (Kimberly Grave
applications and by collecting specific information from the target the ethical hacker can successful to access the information and can reveal
capabilities is collected and maintained far away from the owner’s control. If this information fall into wrong hands results in real attack on the
stockholders, the business will be in risk, which results in all types of disasters, including negative character by media, loss of customers and l
performing the activity, if the methods and tools are used incorrectly they cause damage (Dr. Bruce Hartly V, 2003). Hence from the above cont
provides the disadvantages like the Ethical hacker should be trusted by the organization or business and in case sometimes highly professiona
the unplanned budget and if it goes into the wrong persons hand the business will be in danger and loss of the organization will takes place.

Chapter 3: Research Methodology of Hacking


Data types:
Data type is defined as the format of a data storage which is used to store different set of values. It tells about which type of data to be stored
types of data. They are primary data and secondary data. Both primary and secondary data illustrates the gathering of information and to satis
collected newly and for the first time. The primary data is original. It is the fresh data and is never gathered before. Secondary data is the data
newspapers, magazines and journals. Secondary data is gathered before primary data since it is time consuming. Data is gathered newly in ca
Primary data is used in ethical hacking since the data gathered in this type of data is very efficient. Ethical hacking is used legally for the officia
used in the process of ethical hacking (Rajat Khare, 2006) Hence from the above context it can be said that data types are useful in the ethical

Case study:
According to media and people the word hacking denotes misuse and collapse of computers. They describe it as unfair method of solving the
of the organization namely Amazon, it is not proposed to point out the lesser features but deals with tricks for working the company efficiently
out the creative thinking and innovative ideas by their work in company (Paul Bausch, 2003). Mainly the ethical hacking is the good way to imp
because one can know the administrative password of employees, can reach the behaviour of them and working performance. Employee perfo
hackings look easy for them since they are engaged with the security firms to protect the Amazon fields. Not only in Amazon in each and every

/ Essays / Communications

You might also like