Hi All,
Ethical Hacking is linked with client server computing, since hacking mostly affect servers.
Ethical hackers are doing the it for a good purpose, help protect vulnerable servers.
How they are doing it. For this purpose we should follow the same path of black hat hackers.
1. Footprinting step - With commands such as 'who is', ping, traceroot, nslookup , this is carried out.
2. Scanning step - nmap, nessus etc are used for this purpose
3. Enumeration step- netcat, tcpdump, telnet, firewalk etc used for this purpose
We will see more on this topic soon.
Bye
Ethical Hacking is linked with client server computing, since hacking mostly affect servers.
Ethical hackers are doing the it for a good purpose, help protect vulnerable servers.
How they are doing it. For this purpose we should follow the same path of black hat hackers.
1. Footprinting step - With commands such as 'who is', ping, traceroot, nslookup , this is carried out.
2. Scanning step - nmap, nessus etc are used for this purpose
3. Enumeration step- netcat, tcpdump, telnet, firewalk etc used for this purpose
We will see more on this topic soon.
Bye
No comments:
Post a Comment