Assalam-o-Alaikum
Friends,
Today we start learning about hacking.
Building the Foundation for Ethical Hacking
This part covers the fundamental aspects of ethical hacking. It starts with an overview of the value of
ethical hacking and what you should and shouldn’t do during the process. You get inside the malicious mindset and discover how to plan your ethical hacking efforts. This part covers the steps involved in the ethical hacking process, including how to choose the proper tools.
Hacker:
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.Same people use this for illegal purpose.
Type of Hackers :
There are most common types;
1: Black hat hackers" They use there knowledge for illegal purpose"
2:White hat hacker "They use there knowledge for legal purpose"
3:Grey hat hacker " They use there knowledge for both purpose"
SO we know same books of hacking
1: The hacker playbook
2: The web application hacker's handbook
3: The art of exploitation
4: Shellcoders handbook
What Is a Penetration Test? Some people don't know about penetration testing ( A penetration test is a subclass of ethical hacking; it comprises a set of methods and procedures that aim at testing/protecting an organization’s security. The penetration tests prove helpful in finding vulnerabilities in an organization and check whether an attacker will be able to exploit them to gain unauthorized access to an asset.)
Types of Penetration Tests There are several types of penetration tests; however, the following are the ones most commonly performed:
Network Penetration Test In a network penetration test, you would be testing a network environment for potential security vulnerabilities and threats
Web Application Penetration Test : The Web application penetration test is very common nowadays.
Mobile Application Penetration Test The mobile application penetration test is the newest type of penetration test that has become common since almost every organization uses Android- and iOS-based mobile applications to provide services to its customers.
Social Engineering Penetration Test : The Social Engineering Penetration test can be part of a network penetration test. like as Hacker Movie
Physical Penetration Test : The physical penetration test is what you would rarely be doing in your career as a Penetration tester.
First we read about Vulnerability So start
Vulnerability: This topic is Most Important ( Vulnerability is defined as a flaw or a weakness inside the asset that could be used to gain unauthorized access to it. The successful compromise of a vulnerability may result in data manipulation, privilege elevation, etc.) .This is also known as week point of network
Join our Facebook group for latest news and leactures