Question

In: Computer Science

You have been asked to document and describe the hacking process. After all, the goal of...

You have been asked to document and describe the hacking process. After all, the goal of white hat hacking is to ensure the security of the company resources, and documentation is always part of the process. In a report to your manager, describe the following topics:

The hacking methodology and phases

How scope is established and why the agreement of the scope is important

How ethics come into play when conducting ethical hacking

Solutions

Expert Solution

HACKING METHODOLOGY and PHASES :

The methodology includes permission from organization. Every action done must be reversible. Does no harm to the target systems. There are eight basic steps to be followed:

1.Permission: In this phase, the penetration test is conducted. There is a need to get written permission from the organization prior to conducting the test.

2. Reconnaissance: Performing Reconnaissance is just like conducting a preliminary survey. In this step, all the information is gathered about the target systems. The tools that are widely used in this phase are NMAP, Hping, Maltego, and Google Dorks.

3.Enumeration and scanning: In this process, the hacker probes his network actively using the information from the above phase. Some of the methods used in this phase are port scans, ping sweeps, operating systems detection, observation of facilities used by the target, and so on.SNMP enumeration, UNIX/Linux enumeration, LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration are the enumeration methods.

4. Gaining Access:  In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The primary tool that is used in this process is Metasploit.

5.Escalation of privilege: Exploiting a bug in software to gain elevated access to resources that are normally protected from an application or user. The goal of this step is to move from a low-level account (such as a guest account) all the way up to the administrator.

6. Maintaining Access: It is the process where the hacker has already gained access into a system. After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in the future. Metasploit is the preferred tool in this process.

7. Covering tracks and maintaining backdoors: The process of removing any evidence of the attacker’s presence in a system. The deletion of logs of all the activities that take place during the hacking process.

8.Reporting: Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes.
  

SCOPE:

Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them.

Ethics:

  1. Never knowingly use software or process that is obtained or retained either illegally or unethically.
  2. Not to engage in deceptive financial practices such as bribery, double billing, or other improper financial practices.
  3. Not to make inappropriate reference to the certification or misleading use of certificates, marks or logos in publications, catalogs, documents or speeches.
  4. Disclose to all concerned parties those conflicts of interest that cannot reasonably be avoided or escaped.

Related Solutions

After all your production planning analysis, you have been asked to form a Quality Management Planning...
After all your production planning analysis, you have been asked to form a Quality Management Planning Strategy for management and employees. Using course materials and other resources, develop a strategy document with the following action items: Identify the overall Quality Management Process (TQM, ISO 9000, Six Sigma) the company will use, and explain the rationale for such change. Be aware of industry requirements (i.e. service operations are different from manufacturing, and each process may offer specific advantages for a specific...
You have been asked by the owner of your company to advise her on the process...
You have been asked by the owner of your company to advise her on the process of purchasing some expensive long-term equipment for your company. Give a discussion of the different methods she might use to make this capital investment decision. payback method, etc. Explain each method and its strengths and weaknesses. Indicate which method you would prefer to use and why.
1. Describe wireless networking standards 2. Describe the process of authentication 3. Describe wireless hacking and...
1. Describe wireless networking standards 2. Describe the process of authentication 3. Describe wireless hacking and tools used by hackers and security professionals 4. Explain that configuring an AP varies depending on the embedded OS. 5. Explain how data sent by one station moves between these three components to reach a second station. 6. Explain the security improvements of 802.11i over 802.11b. Book to use: Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition. (Chapter 11)...
Chapter 10, The Interview and Assessment Process 1.You have been asked to conduct an interview for...
Chapter 10, The Interview and Assessment Process 1.You have been asked to conduct an interview for a psychiatric–mental health client. a} What part of conducting an interview to obtain psychosocial data on a client is most difficult for you?` b} What part of conducting an interview to obtain psychosocial data on a client is relatively easy for you? What are your strengths as an interviewer and what skills do you need to develop? You are working at a psychiatric–mental health...
You have been asked to make a presentation to the international environmental conference 2009. describe the...
You have been asked to make a presentation to the international environmental conference 2009. describe the three keyponits that you would make in your presentation. Would kindly appreciate if answers are in text form not handwritten. Thank you.
You have been asked to make a presentation to the International Environmental Conference 2009. Describe the...
You have been asked to make a presentation to the International Environmental Conference 2009. Describe the three key points that you would make in your presentation.
After establishing the protein expression laboratory for your company, you have been asked to produce human...
After establishing the protein expression laboratory for your company, you have been asked to produce human insulin protein in bacteria. Although you do not have to worry about purification (that is another lab), you do have to express the protein at sufficiently high levels. Note that the gene has already been placed behind a bacterial promoter to allow for bacterial transcription. Answer the following questions regarding this expression: a) What component or components of the insulin gene will need to...
You have been asked to review the December 31, 2021, balance sheet for Champion Cleaning. After...
You have been asked to review the December 31, 2021, balance sheet for Champion Cleaning. After completing your review, you list the following three items for discussion with your superior: An investment of $33,000 is included in current assets. Management has indicated that it has no intention of liquidating the investment in 2022. A $130,000 note payable is listed as a long-term liability, but you have determined that the note is due in 10, equal annual installments with the first...
If you were asked to provide a small tip (or bribe) to have a document approved...
If you were asked to provide a small tip (or bribe) to have a document approved in a foreign nation where this practice is customary, what would you do?
Suppose that you have been asked to analyze an economic model. Describe how you would structure...
Suppose that you have been asked to analyze an economic model. Describe how you would structure your analysis?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT