Ethical Hacking – Learning the Basics Gain the Basic Concepts of Ethical Hacking

  • Sunil Gupta

Your browser needs to be JavaScript capable to view this video

Try reloading this page, or reviewing your browser settings

You're watching a preview of subscription content. Log in to check access

Focus Go through the basics of network security and penetration testing to begin your journey to becoming an ethical hacker: a skilled professional who looks for weaknesses and vulnerabilities in software systems and uses this knowledge to defend them from external breaches. You will learn the concepts of ethical hacking and look at issues from a hacker’s perspective.

The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach.

What You Will Learn

  • Gain a basic understanding of ethical hacking

  • Set up your first virtual machine

  • Get acquainted with Linux terminal commands

  • Carry out network and web penetration testing

  • Spot vulnerabilities in the software system

Who This Video Is For

Anybody who is interested in learning ethical hacking/penetration testing and who wants to learn how to secure their websites and networks from hackers.

About The Author

Sunil Gupta

Sunil Gupta consults as a computer and cyber security expert in information technology with a focus on cyber security. He is invited as a speaker to a number of conferences and community events. He is a visionary and cyber security professional who thrives on solving complex security problems. He is passionate about customer service and his role as a cyber security expert, and always exceeds his clients’ expectations.

Sunil works as a freelance security consultant and researcher in Delhi, India. His primary focus lies with perimeter defense, secure network design, vulnerability discovery, penetration testing, compliance and intrusion detection systems. His client list includes Barclays bank, Aviation College Qatar (QATAR), Ethiopian Airlines, Telecom Authority Tanzania, NCB bank (Saudi Arabia), and Accenture (India) to name a few.

 

About this video

Author(s)
Sunil Gupta
DOI
https://doi.org/10.1007/978-1-4842-4348-0
Online ISBN
978-1-4842-4348-0
Total duration
1 hr 5 min
Publisher
Apress
Copyright information
© Sunil Gupta 2019

Related content

Video Transcript

Gupta: Hello and welcome to the Introduction to Ethical Hacking. In this Video, we are going to take a look at various points. First of all, we will learn about Ethical Hacking overview. Then we will learn about what are the Types of Hackers and finally we will learn about the Types of Testing. So, let’s start with what is Ethical Hacking. On the first point, you can see that Ethical Hacking is a process to identify and exploit weakness. It means that it is a process in which you need to identify the vulnerability or weakness of the system and then you need to exploit it, then you need to intrude it in the system using that weakness. That complete process is called Ethical Hacking.

What is the goal of Ethical Hacking? The goal of Ethical Hacking is to secure systems, right. To secure your network, to secure your website or to secure your application Ethical Hacking process is used. Let’s take an example here. So, we can see here that example is weakness of default password. What is default password? Default passwords are those passwords, which are predefined. For example, admin admin, root, guest so these all are default passwords. So if any system is using these default passwords there is a possibility that attacker can easily attack on that system and can get complete access. That’s why system should not use default passwords. So this is an example that how to find out weakness and how you can exploit it.

Now, let’s talk about the types of Hackers. So, there are major, three types available here. So one is Black Hat, second is White Hat and third is Grey Hat. Black Hat Hackers work only in illegal way, right. White Hat Hackers only work in legal way, means they don’t perform any kind of hacking. They always perform Ethical Hacking. So, White Hat Hackers are called Ethical Hackers. Black Hat Hackers are called Crackers and Grey Hat Hackers are in between Black Hat and White Hat. They work in both ways legal as well as illegal. So, these are the three major categories of Hackers.

Now let’s talk about the Types of Testing available in industry. So there are three types of testing available in industry. Black Box Testing, White Box Testing and Grey Box Testing. In Black Box Testing, pen tester doesn’t have any knowledge about the target. When you don’t have any knowledge about the target and then you are performing pen testing that is called Black Box Testing. In White Box Testing, pen tester have complete knowledge about target. For example, if I’m performing pen testing on a network, I’m an Ethical Hacker, so I have complete knowledge about the number of systems there, the IP Addresses of server and some other knowledge. So, that testing is called White Box Testing. Grey Box Testing is basically, partial knowledge about target. When pen tester have partial knowledge about target, means, for example, he knows about the number of systems available inside the network, but doesn’t have any knowledge about the IP addresses of any systems. So that is Grey Box Testing so these three are the major testing categories in Ethical Hacking industry.