CATEGORY: Ethical Hacking
8.4 – National Security
Man has been at war with each other for centuries now. Initially, it began with killing people and then went to attacking countries with guns, bombs and other dangerous weapons. As technology develops, so do the ways of war, and now the latest one is cyber-war. Richard A. Clarke, a top U.S. cybersecurity professional, described […]
8.3 – Testing Classification
Based on testing methodologies, we can divide penetration testing into three different groups: Black Box Testing White Box Testing Gray Box Testing Let us discuss each type of penetration testing method one by one: Black Box Testing This is the most essential and universally followed testing method because it focuses on real world situations. A […]
8.2 – Hacking Process
The process of ethical hacking can be divided into five distinct phases. An ethical hacker follows procedures similar to those of a malicious attacker. The phase to gain, and maintain access to a computer system, is alike no matter what the hacker’s aims are. Below are the five phases which are generally followed by a […]
8.1 – Hacking Business
Hackers can be divided into three groups: White Hat: Ethical Hacker (Good Guy) Black Hat: Malicious Hacker (Bad Guy) Gray Hat – Depends on the situation, Good or Bad hacker. White Hat Hackers: These are the ethical hackers, known as good guys, who use their hacking skills for protective purposes. Often, white hat hackers are […]
8.0 – Basics of Hacking
[Though this section looks similar to some portions in the Foundation of Cybersecurity section, the focus of the contents is entirely different] Hacking is the practice of changing a computer software or hardware to achieve a goal outside of the creator’s unique purpose. Generally, people who are engaged in activities like hacking are called hackers. […]






