Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
8.3 – Testing Classification
Based on testing methodologies, we can divide penetration testing into three different groups: Black Box Testing White Box Testing Gray Box Testing Let us discuss each type of penetration testing method one by one: Black Box Testing This is the most essential and universally followed testing method because it focuses on real world situations. A […]
8.2 – Hacking Process
The process of ethical hacking can be divided into five distinct phases. An ethical hacker follows procedures similar to those of a malicious attacker. The phase to gain, and maintain access to a computer system, is alike no matter what the hacker’s aims are. Below are the five phases which are generally followed by a […]
8.1 – Hacking Business
Hackers can be divided into three groups: White Hat: Ethical Hacker (Good Guy) Black Hat: Malicious Hacker (Bad Guy) Gray Hat – Depends on the situation, Good or Bad hacker. White Hat Hackers: These are the ethical hackers, known as good guys, who use their hacking skills for protective purposes. Often, white hat hackers are […]
8.0 – Basics of Hacking
[Though this section looks similar to some portions in the Foundation of Cybersecurity section, the focus of the contents is entirely different] Hacking is the practice of changing a computer software or hardware to achieve a goal outside of the creator’s unique purpose. Generally, people who are engaged in activities like hacking are called hackers. […]






