1.

Solve : HACKING SOLUTIONS?

Answer»

HOW WE CAN USE ETHICAL HACKING?Not with all caps. Is this Spam?
Ethical Hacking would be to use an unusual method to help people avoid danger.

Quote

The MAJORITY of people in the security industry use the term interchangeably with the term "white hat" - a COMPUTER hacker that performs all kinds of penetration testing against an organization's information systems, at the behest of that same organization and so that it can secure those systems against black HATS (straight up "bad guys" hacking for money) and grey hats.

What is called a "cyber sting operation" can be used by law enforcement to gete criminals trying to defraud people with the use of computers.
However, the term "Hacker" is now most often used in a negative way. So you find headlines that read "Computer Experts Help Police Get Hackers."
Ethical Hacking is very popular in the Open Source community where the source code is wide open for change and vulnerabilities are detected by ethical hacking if not plainly obvious in the source code to be pointed out, and shared in an ethical "white hat" hacker way to make the software or operating systems more secure and better.

The black hats are the ones who use vulnerabilities for personal gain in illegal activities. Then you have those who play both sides of the fence, the grey hats.DaveLembke, what color is your hat?
HEY...LOL its White. I use to serve up honeypots to watch them get hacked etc and see what methods hackers used and tools. If you put something out on the DMZ with lots of vulnerabilities it doesnt TAKE long for a hacker to bite at the bait. I'd have them hit the systems and then take them offline and see what goodies they left behind. Keyloggers, redirectors, etc. It was fun until I started getting DoS attackers that would affect my telephone which is Vonage and needs bandwidth, and the DoS was choking up my bandwidth. After checking them out, I'd reimage them with Ghost image and put them back out to catch another person. The best honeypots are the ones that look to the hacker as if they just got into something interesting such as you populate it with all sorts of false info that looks important and business or financial related that is all bogus.

*I did have a repeat hacker though who left a message on my desktop with notepad open of the one honeypot once though which was rather cool. He or she actually stated in "NICE HONEYPOT", and the give away to my honeypot was that the IP was registered to Comcast and the IP was not of the Comcast Static IP issued range, and he had seen this same system and messed with it prior. But he didnt sign the message with his hacker identity, it was just a note left for me which was rather cool.


Discussion

No Comment Found