Category: Ethical Hacking
Man has been at war with each other for centuries now. Initially, it began with killing people and then went to attacking countries with guns, bombs and other dangerous weapons. As technology develops, so do the ways of war, and…
Based on testing methodologies, we can divide penetration testing into three different groups: Black Box Testing White Box Testing Gray Box Testing Let us discuss each type of penetration testing method one by one: Black Box Testing This is the…
The process of ethical hacking can be divided into five distinct phases. An ethical hacker follows procedures similar to those of a malicious attacker. The phase to gain, and maintain access to a computer system, is alike no matter what…
Hackers can be divided into three groups: White Hat: Ethical Hacker (Good Guy) Black Hat: Malicious Hacker (Bad Guy) Gray Hat – Depends on the situation, Good or Bad hacker. White Hat Hackers: These are the ethical hackers, known as…
[Though this section looks similar to some portions in the Foundation of Cybersecurity section, the focus of the contents is entirely different] Hacking is the practice of changing a computer software or hardware to achieve a goal outside of the…