Cyber Security 1.2.1 [Penetration Test / Ethical Hacking]
Hello Folks, welcome back!!
This articles is only for education purpose, If you are using any of those techniques for illegal purposes, we are not responsible for possible lawful consequences.
Man!!! I cant type Penetration Test & Ethical Hacking again and again, Let me call it as PT & EH !!! LOL ;)
Most of the companies hire pen testers [PT] to launch planned and simulated attacks to check the misconfigurations and vulnerabilities in their environment.
Types of PT or Hackers:
Black-Box test or Black Hat—
Testers have no information about the targets, they have to do their own research to prepare an attack plan, attacker who targets to destroy is called as a Black Hat.
White-Box test or White Hat—
PTesters will have all the information of the targets, companies will share the network information, credentials, Architectures etc, White Hat hacker has skills as same as Black Hat. White Hat are for defend the Black Hat attacks.
Gray-Box test —
PTesters will have some information but not much, companies might share only network and infrastructure information/Architecture. Gray Hat will act like both offensive and defensive.
Some other Hackers :(
Government Spons —
Employed by the Govt [Contractor or Permanent] to penetrate and gain the confidential information.
Cyber Terrorists —
These individuals are highly motivated by polictical, religional, & Criminals to aim on destruction of computer networks in large scale.
Suicide Hackers —
Aims on destruction or shutdown the critical infrastructure for extreme cause, these are not worried about the punishment.
Hactivist —
Only promote a political agenda by disabling the websites.
Script Kiddies —
Man!! these are young blood in hacking, no skills in hacking but they will compromise the infrastructure with use of running scripts, tools and softwares developed by real world hackers.
Steps to perform EH:
PT’s & EH Operating Systems:—
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>TOP OPERATING SYSTEMS FOR PT or EH>>>>>>>>>>>>>>>>
- Kali Linux — https://www.kali.org/
- Parrot OS — https://parrotlinux.org/
- BackBox — https://www.backbox.org/
- BlackArch — https://blackarch.org/
- Fedora Security Lab — https://labs.fedoraproject.org/en/security/
- Dracos Linux — https://www.dracolinux.org/
- CAINE — https://www.caine-live.net/
- Samurai Web Testing Framework — http://www.samurai-wtf.org/
- Network Security Toolkit (NST) — https://www.networksecuritytoolkit.org/nst/index.html
- DemonLinux — https://www.demonlinux.com/
- ArchStrike — https://archstrike.org/
Cya in next page!
Please provide your feedback in comments and if this article is helpful give a like (clap) :)