OP 23 September, 2022 - 04:08 PM
(This post was last modified: 23 September, 2022 - 04:10 PM by lunatech. Edited 2 times in total.)
Ethical Hackers:
A person who performs the hacking activities is called a hacker.
There are six types of hackers:- The Ethical Hacker (White Hat)
- Cracker
- Grey hat
- Script kiddies
- Hacktivist
- Phreaker
Companies that provide online services or those which are connected to the internet, must perform penetration testing by ethical hackers. Penetration testing is another name for ethical hacking. It can be performed manually or through an automation tool.
Ethical hackers work as information security experts. They try to break the security of a computer system, network, or application. They identify the weak points and based on that, they give advice or suggestions to strengthen the security.
Programming languages that are used for hacking include PHP, SQL, Python, Ruby, Bash, Perl, C, C++, Java, VBScript, Visual Basic, C Sharp, JavaScript, and HTML.
1) Acunetix is a fully automated ethical hacking tool that detects and reports on over 4500 web application vulnerabilities including all variants of SQL Injection and XSS. The Acunetix crawler fully supports HTML5 and JavaScript and Single-page applications, allowing auditing of complex, authenticated applications.
2) OpenVAS Vulnerability Assessment Scanner is a fully-featured tool that can perform unauthenticated & authenticated testing and performance tuning for large-scale scans. It contains the capabilities of various high-level & low-level internet & industrial protocols and a powerful internal programming language.
3) NetStumbler is a wireless networking tool. It supports Windows OS. It makes use of 802.11b, 802.11a, and 802.11g WLAN for the detection of wireless LANs. It also has a trimmed-down version called MiniStumbler that is for handheld Windows CE OS. It provides integrated support for a GPS unit.
4) John The Ripper is a tool for password cracking. It can be used on Windows, DOS, and Open VMS. It is an open-source tool. It is created for detecting weak UNIX passwords.
5) SQLMap is a tool for automating the process of detecting & exploiting SQL injection flaws and taking charge of database servers. It is an open-source tool and has a powerful detection engine. It completely supports MySQL, Oracle, PostgreSQL, and many more. It fully supports six SQL injection techniques, Boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries, and out-of-band.
Like is appreciated