Professional Documents
Culture Documents
Threat
Vulnerability
Exploit
Target Of Evaluation
Zero-Day Vulnerability
www.eduors.com www.facebook.com/eduors
Identifying Different Types of Hacking Technologies
Operating systems
Applications
Shrink-wrap code
Misconfigurations
www.eduors.com www.facebook.com/eduors
Understanding the Different Phases Involved in Ethical
Hacking and Listing the Five Stages of Ethical Hacking
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
www.eduors.com www.facebook.com/eduors
Hacker Classes
White hats
Black hats
Grey hats
Hacktivism
www.eduors.com www.facebook.com/eduors
Security consists of four basic elements
Confidentiality
Authenticity
Integrity
Availability
www.eduors.com www.facebook.com/eduors
Security, Functionality, and Ease of Use Triangle
www.eduors.com www.facebook.com/eduors
Penetration Testing
www.eduors.com www.facebook.com/eduors
Testing Types
Black box
White box
Grey box
www.eduors.com www.facebook.com/eduors
Types of Ethical Hacks
Remote network
Remote dial-up network
Local network
Stolen equipment
Social engineering
Physical entry
www.eduors.com www.facebook.com/eduors
Types of Vulnerabilities
www.eduors.com www.facebook.com/eduors
Vulnerability Research web sites
http://www.securityfocus.com/
http://nvd.nist.gov/
http://www.securitytracker.com/
http://www.securiteam.com/
www.eduors.com www.facebook.com/eduors
Exploits Type
Remote Exploit
Local Exploit
www.eduors.com www.facebook.com/eduors
Exploits Research web site
http://www.exploit-db.com
http://www.securitytube.net/
www.eduors.com www.facebook.com/eduors
Penetration Test Report
http://www.offensive-security.com/penetration-testing-sample-
report.pdf
http://www.vulnerabilityassessment.co.uk/report%20template.html
http://www.besnard.org/biometrics/2BIO706_business_report.pdf