Hi Dear friends, how are you?. Today i am going to explain something very special about Ethical Hacking. It is also known as Red teaming and attack & penetration test. Read out my last articles: Dreamweaver Download Free Software + Urdu Videos
The basic purpose is to break the protection of personal computers for some specific data or for general purposes and the most common use is to violate the protection of the internet and cause damage to servers and steal sensitive information from those servers. Some people do stealing tricks only for fun and testing their own abilities and their intentions are not to make damage to anyone.
It means to accept the rules and regulations that are defined by your self or by your government for living a respectful life in society.
Now we are going to talk about red teaming. It is totally legal because it’s not harmful. People done this just for checking the weaknesses of the servers and other devices in the network. Hackers obtained permissions from the owners of the appliances to be assaulted. They have done their job in a non destructive manner. It means that every data and service on the network is secure. You will knew about the areas which are to be more secured so anyone will never ever break the protection of the devices. Some companies personally hires some people to check the weaknesses of their systems.
It is very important in this revolutionary world. It is used to prevent many types of damages from the unauthorized hackers for example social engineering, organizational damages, Automated dangers, Viruses, Trojan horse, Worms, DOS(denial of services) and many other type of attacks.
It is not a one step procedure. Its a five step process that should be follow to steal something.
Preparation is a mandatory part of any process without preparation the goal cannot be achieved. It is first and foundation level phase of any process to achieve some goal. First is to identify the targets. Identification of the websites, personal computers or servers on which sensitive information is stored. Estimating the time required for assault, the money to be used and contacting the people who are sharing the facts and figures and statistics with the hackers. Seeking the knowledge which is necessary to do.
Second important part is foot printing. Collecting much knowledge about the target. Collecting knowledge about the DNS (domain name system) servers, I P ranges(Internet protocols) contacts of the administrators and the problems which are revealed by the administrator. Getting knowledge about different sources such as databases a search engines etc.
Identifying the logical job of the network such as ports to be used the regulations like transfer control & Internet control message protocol)). Methods to be used and the different tools(N map, F scan, Firewall, SSH) that are very important in violating the security.
This is the part in which red tamers identify the weak points of the system (weak passwords, open access points, validation issues, insecure programming codes, in secure configurations. Identification of different methods and different tools that can be helpful while getting the information.
This is the final and last but the most important step because all the previous planning had done for this step.
Attack basically means break the security and obtain as much information as you can. Access the appliances as like the normal and authorized users. Target a specific appliance or group of appliances and then gain access of the devices and spread viruses or steal data. Exploit the operating software, Methods, Security, Protocols(HTTP(hyper text transfer protocol.))
Download Free Outsource stuff for Ethical Hacking
Books : here
Ethical stealing is a power full way to obtain knowledge about your weak and strong points of the protection. By doing this administrators can improve the security of the appliances, deny the permission request from an unauthorized user. Use your skills in a powerful and Positive way. Best of Luck!
I hope you enjoyed very much to understand what i mean, i did my best to explain everything clearly, If you Have any questions about this article. You can ask me in the comment box below. We have for support call us right back service for our customers here. You can add your name and mobile number and whatever issue you have. Just it and go ahead. After submission of your call back request one of our team member contact you shortly. .