Study on Ethical Hacking and Penetration Testing

Authors

  • Abhishek Gupta  AISECT University, Bhopal, Madhya Pradesh, India
  • Dr. Jatinder Singh Mahnas  Sr. Assistant Professor, University of Jammu, Jammu and Kashmir, India

Keywords:

Ethical Hacking, Penetration,Vulnerabilities, Hacker .

Abstract

Ethical hacking refers to the act of tracing weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. Hacking is an activity in which, a person exploits the weakness in a system for self-profit or enjoyment. As public and private organizations migrate more of their critical functions or applications such as electronic commerce, marketing and database access to the Internet, then hackers have more opportunity and incentive to gain access to sensitive information through the Web application. Thus the need of protecting the systems from the hacking generated by the hackers is to promote the persons who will punch back the illegal attacks on our computer systems. Ethical hacking is an identical activity which aims to find and rectify the weakness and vulnerabilities in a system. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions. This paper describes what is ethical hacking, what are the types of ethical hacking, impact of Hacking on Businesses and Governments and penetration testing used for protection form hackers .

References

  1. http://www.articlesbase.com/security-articles/ethical-hacking-an-introduction-402282.html
  2. http://www.ehacking.net/2011/06/top-6-ethical-hacking-tools.html#sthash.nszGZw4y.dpuf
  3. OWASP. “Web Application PenetrationTesting,”http://www.owasp.org/index.php/Web_Application_Pene tration_Testing.
  4. http://www.corecom.com/external/livesecurity/pentest.html
  5. http://www.networkdefense.com/papers/pentest.html
  6. Internet Security Systems, Network and Host-based Vulnerability Assessment
  7. http://www.infosecinstitute.com/blog/ethicalhacking_computer_forensics.html
  8. http://searchnetworking.techtarget.com/generic/0,295582,sid7_gci1083715,00.html
  9. http://www.owasp.org/index.php/Testing:_Information_Gathering

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Abhishek Gupta, Dr. Jatinder Singh Mahnas, " Study on Ethical Hacking and Penetration Testing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.466-470, July-August-2017.