Study on Ethical Hacking and Penetration Testing

Authors(2) :-Abhishek Gupta, Dr. Jatinder Singh Mahnas

Ethical hacking refers to the act of tracing weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. Hacking is an activity in which, a person exploits the weakness in a system for self-profit or enjoyment. As public and private organizations migrate more of their critical functions or applications such as electronic commerce, marketing and database access to the Internet, then hackers have more opportunity and incentive to gain access to sensitive information through the Web application. Thus the need of protecting the systems from the hacking generated by the hackers is to promote the persons who will punch back the illegal attacks on our computer systems. Ethical hacking is an identical activity which aims to find and rectify the weakness and vulnerabilities in a system. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions. This paper describes what is ethical hacking, what are the types of ethical hacking, impact of Hacking on Businesses and Governments and penetration testing used for protection form hackers .

Authors and Affiliations

Abhishek Gupta
AISECT University, Bhopal, Madhya Pradesh, India
Dr. Jatinder Singh Mahnas
Sr. Assistant Professor, University of Jammu, Jammu and Kashmir, India

Ethical Hacking, Penetration,Vulnerabilities, Hacker .

  1. http://www.articlesbase.com/security-articles/ethical-hacking-an-introduction-402282.html
  2. http://www.ehacking.net/2011/06/top-6-ethical-hacking-tools.html#sthash.nszGZw4y.dpuf
  3. OWASP. “Web Application PenetrationTesting,”http://www.owasp.org/index.php/Web_Application_Pene tration_Testing.
  4. http://www.corecom.com/external/livesecurity/pentest.html
  5. http://www.networkdefense.com/papers/pentest.html
  6. Internet Security Systems, Network and Host-based Vulnerability Assessment
  7. http://www.infosecinstitute.com/blog/ethicalhacking_computer_forensics.html
  8. http://searchnetworking.techtarget.com/generic/0,295582,sid7_gci1083715,00.html
  9. http://www.owasp.org/index.php/Testing:_Information_Gathering

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 466-470
Manuscript Number : CSEIT1172415
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Abhishek Gupta, Dr. Jatinder Singh Mahnas, "Study on Ethical Hacking and Penetration Testing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.466-470, July-August-2017.
Journal URL : http://ijsrcseit.com/CSEIT1172415

Article Preview