Posts

Footprinting & Reconnaissance - Chapter 3

Footprinting & Reconnaissance What is Footprinting Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected. Footprinting helps to Know Security Posture – The data gathered will help us to get an overview of the security posture of the company such as details about the presence of a firewall, security configurations of applications etc. Reduce Attack Area – Can identify a specific range of systems and concentrate on particular targets only. This will greatly reduce the number of systems we are focusing on. Identify vulnerabilities – we can build an information database

Phases of EH - Chapter 2

Chapter 2 **Please read this article only after reading my articles on Cybersecurity Introduction. Not because you will not understand this chapter, but it’s important that you should know how to be secured in the first place. ** What is Ethical Hacking? Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users. Ethical hackers are expected to report all the vulnerabilities and weakness found during

Cybersecurity - Chapter 1

Image
Chapter 1 Web Applications Foundation: SDLC: Software Development Life Cycle. Software Development Life Cycle (SDLC)  is a frame work that defines activity that are performed during software development process. There are 6 phases in SDLC model as given below. ·          Requirement: In this phase all the requirement are collected from customer/client. They are provided in a document called Businessmen requirement specification (BRS) and System requirement specification (SRS). All the detail are discuss with customer/client in detail. ·          Design: It has two steps: High level design (HLD):  It give the architecture of software product. Low level design (LLD):  It describe how each and every feature in the product                        should work and every component. ·          Implementation: This is the longest phase. This phase consists of Front end + Middle ware + Back-end In font end: development coding are done even SEO setti