Hi All,
Ethical Hacking is really linked with client server computing, since hacking mostly affect servers.
Ethical hackers are doing the same for a good purpose, help protect vulnerable servers.
How they are doing so. For this purpose we should follow the same path of hackers
1. Footprinting - With commands such as 'who is', ping, traceroot, nslookup , this is carried out.
2. Scanning - nmap, nessus etc are used for this purpose
3. Enumeration - netcat, tcpdump, telnet, firewalk etc used for this purpose
We will see more on this soon.
Bye
Ethical Hacking is really linked with client server computing, since hacking mostly affect servers.
Ethical hackers are doing the same for a good purpose, help protect vulnerable servers.
How they are doing so. For this purpose we should follow the same path of hackers
1. Footprinting - With commands such as 'who is', ping, traceroot, nslookup , this is carried out.
2. Scanning - nmap, nessus etc are used for this purpose
3. Enumeration - netcat, tcpdump, telnet, firewalk etc used for this purpose
We will see more on this soon.
Bye
No comments:
Post a Comment