Thursday, October 16, 2008

Types of Ethical Hacks

Ethical hackers can use many different methods to breach an organization’s security during asimulated attack or penetration test. The most common methods follow:
  1. റിമോട്ട് നെറ്റ്‌വര്‍ക്ക് :- A remote network hack attempts to simulate an intruder launching anattack over the Internet. The ethical hacker tries to break or find a vulnerability in the outsidedefenses of the network, such as firewall, proxy, or router vulnerabilities.Remote
  2. ഡയല്‍ -അപ് നെറ്റ്‌വര്‍ക്ക് A remote dial-up network hack tries to simulate an intruderlaunching an attack against the client’s modem pools. War dialing is the process of repetitivedialing to find an open system and is an example of such an attack.
  3. ലോക്കല്‍ നെറ്റ്‌വര്‍ക്ക് A local network hack simulates someone with physical access gainingadditional unauthorized access using the local network. The ethical hacker must gaindirect access to the local network in order to launch this type of attack.
  4. സ്റൊലെന്‍ എകുഇപ്മെന്ട് A stolen-equipment hack simulates theft of a critical information resourcesuch as a laptop owned by an employee. Information such as usernames, passwords, securitysettings, and encryption types can be gained by stealing a laptop.
  5. സോഷ്യല്‍ എഞ്ചിനീയറിംഗ് A social-engineering attack checks the integrity of the organization’semployees by using the telephone or face-to-face communication to gather information for usein an attack. Social engineering attacks can be used to acquire usernames, passwords, or otherorganizational security measures.
  6. ഫിസിക്കല്‍ എന്‍ട്രി A physical-entry attack attempts to compromise the organization’s physicalpremises. An ethical hacker who gains physical access can plant viruses, Trojans, rootkits,or hardware key loggers (physical device used to record keystrokes) directly on systems in thetarget network.

No comments: