Shells provides you with a 1-click, powerful virtual desktop environment in the cloud!
Hello, world! Great to be back and writing. I've been on a mission lately exploring the operating systems of the Linux world from mainstream to underground distros.
I've found a lot of great tools, and new ways of exploring how I go about testing products and services. Today I wanted to start the journey with Ethical Hacking.
An ethical hacker (also known as a white hat) is somebody who understands the nature of exploiting vulnerable systems and has the ability to cause all hell and wreak havoc on systems connected to the internet. Especially with the Internet of Things, EVERYTHING is hackable!
But, instead of the normal "Bring down your website and business!" type of hackers. These hackers are testing for vulnerabilities in their own systems, whether for work or personal projects, or just for fun.
Ethical Hackers break the system and apply or tell you how to apply fixes. Better the good guys than the bad guys taking over your system, right?
Yeah, you can rage hell on systems, or you can have the owners of those systems pay you to keep it secure. It's a certain type of gratification when you check your system logs and see all the failed attempts and even blocked IP addresses because you found your system's weakness before they did.
An ethical hacker should have a wide range of computer skills. They often specialize, becoming subject matter experts (SME) on a particular area within the ethical hacking domain.
Injection attacks and ethical hackers
An injection attack is a sophisticated tactic where a protagonist can inject their own programming on a target to gain access.
Broken authentication and ethical hackers
Used to be and still remains a significant problem with Wifi. Strong encryption and passwords are a MUST. Most wifi passwords are easily bruteforce'd, decrypted, or your password is sniffed out of the air by a program called AirCrack-Ng.
Security misconfiguration and ethical hackers
You know what they say... RTFM! Misconfigured software is a common one easily solved with "Best configuration for X" on a search engine.
Use of components with known vulnerabilities. Things such as old PHP libraries for a website, or old software not being updated. It only takes one vulnerability for an intruder to gain access to everything.
Sensitive data exposure and ethical hackers
Keep your user's data encrypted and away from the public eye. Hackers today will scrape the entire website to get all user data it can see. They will then manipulate the users and often sell their information.
Until the next edition, be safe...!
By Shane Britt, Shells.com
Create your free account to unlock your custom reading experience.