Open Access   Article Go Back

A Survey on Ethical Hacking Techniques

J. Sathya1 , T. Manivannan2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 91-96, Feb-2019

Online published on Feb 28, 2019

Copyright © J. Sathya, T. Manivannan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Sathya, T. Manivannan, “A Survey on Ethical Hacking Techniques,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.91-96, 2019.

MLA Style Citation: J. Sathya, T. Manivannan "A Survey on Ethical Hacking Techniques." International Journal of Computer Sciences and Engineering 07.04 (2019): 91-96.

APA Style Citation: J. Sathya, T. Manivannan, (2019). A Survey on Ethical Hacking Techniques. International Journal of Computer Sciences and Engineering, 07(04), 91-96.

BibTex Style Citation:
@article{Sathya_2019,
author = {J. Sathya, T. Manivannan},
title = {A Survey on Ethical Hacking Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {91-96},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=728},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=728
TI - A Survey on Ethical Hacking Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - J. Sathya, T. Manivannan
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 91-96
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Hacking is a task in which, a person utilize the weakness in a system for self-profit or indulgence. Ethical hacking is an indistinguishable activity which aims to find and rectify the weakness in a system. In the growing era of internet computer security is of utmost concern for the organizations and government. These companies are using Internet in their wide variety of applications such as marketing, electronic commerce, and database access. But at the same time, data and network security is a serious issue that has to be talked about. This paper attempts to discuss the overview of hacking and how ethical hacking disturbs the security. Also the Ethical Hackers and Malicious Hackers are different from each other and playing their important roles in security. This paper studied the different types of hacking with its phases. The hacking can also be categorized majorly in three categories such as white hat, black hat and grey hat hacking. This paper also presents a comparison of the hacking categories with different methods of penetration testing.

Key-Words / Index Term

Hackers, Ethical Hacking, Hacking Phases

References

[1] Agarwal, AnkitKumar, Hacking : Research paper, online http://ankitkumaragarwal.com /hacking-a-research- paper/ (visited on may2012)
[2] Wilhelm, Douglas. "2". Professional Penetration Testing.Syngress Press. p. 503.ISBN 978-1-59749-425-0
[3] Moore, Robert (2006). Cybercrime: Investigating High- Technology Computer Crime (1st ed.). Cincinnati, Ohio:
[4] Anderson Publishing. ISBN 978-1-59345-303-9
[5] EC-Council (n.d.). Ethical Hacking and Countermeasures, online http://www.eccouncil.org/ipdf/EthicalHacker.pdf (visited on may 2012)
[6] Ethical Hacking Basics Class part , online http://www.go4expert.com/forums/ showthread.php?t=11925 (visited on may 2012)
[7] Palmer, C.C.(2001,April 13). Ethical Hacking. IBM Systems Journal Vol. 40 No.3 2001
[8] Http://1000projects.org/how-is-ethical-hacking-done-cs- student-project-seminar.html
[9] en.wikipedia.org/wiki/Penetration_testing
[10] About Effective Penetration Testing Methodology byByeong-Ho KANG