A Study on Ethical Hacking

Authors

  • Ashish Oberoi Assistant Professor, Department of Computer Science & Engineering, RIMT University, Mandi Gobindgarh, Punjab, India Author

DOI:

https://doi.org/10.55524/

Keywords:

Computer, Data, Ethical Hacking, Hacker, Security

Abstract

Though all material is now available  online, numerous individuals are using it; most are using it  to learn things, while many others are using it to educate  both how to harm or stealing information from websites or  networks without such owner’s permission. The purpose  of this essay is to define hacking, who programmers seem  to be, what vulnerability assessment is, what ethically  hacking's code of conduct is, but also why browser  hijackers are required. The Linux kernel is briefly  described in detail.. All of the methods are carried out on  the Kali Linux operating system. Following that, the article  discusses phishing attacks and denial of service attacks  (Denial of Services Attack). In addition, the paper  discusses what Wi-Fi is, how to secure Wi-Fi networks,  and how hackers crack Wi-Fi passwords. This paper is  very useful for future work as researcher can use this paper  for their survey. 

Downloads

Download data is not yet available.

References

Jamil D. IS ETHICAL HACKING ETHICAL ? 2011;3(5):3758–63.

Hartley RD. Ethical Hacking Pedagogy: An Analysis and Overview of Teaching Students to Hack. J Int Technol Inf Manag. 2015;24(4).

Jain RK, Kumar A, Singh NL, Tommasino L, Singh BK. Measurement of peak fluence of neutron beams using Bi fission detectors. Pramana - J Phys. 2012;

Vignesh R, Rohini K. Analysis to determine the scope and Challenging responsibilities of Ethical Hacking employed in Cyber Security. Int J Eng Technol. 2018;

Kumar S, Singh MK, Jain RK, Singh V. Characteristics of the projectile and target fragments produced in 8 4 Kr 3 6 - Emulsion interaction at 1 GeV per nucleon. Int J Mod Phys E. 2020;

Singh MK, Kumar S, Jain RK, Singh V. Study of emission characteristics of the projectile fragments produced in the interaction of 84Kr36 with nuclear emulsion detector at 1 GeV. Chinese J Phys. 2020;

Chandra N, Parida S. Quantum entanglement in photon induced electron spectroscopy of atoms and molecules its generation, characterization, and applications. In: Advances in Imaging and Electron Physics. 2016.

Tulasi Prasad S. Ethical Hacking and Types of Hackers. Int J Emerg Technol Comput Sci Electron. 2014;11(2).

Duksh YS, Kaushik BK, Agarwal RP. FDTD technique based crosstalk analysis of bundled SWCNT interconnects. J Semicond. 2015;

Rai J, Tripathi RC, Gulati N. A comparative study of implementing innovation in education sector due to COVID-19. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.

Hat Hackers.

Mishra N, Singhal P, Kundu S. Application of IoT products in smart cities of India. In: Proceedings of the 2020 9th

International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.

Singh S, Kumar J. Miniaturized triband circular patch antenna for X band, Ku band and K band applications. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.

Al-Karaki JN, Ababneh N, Hamid Y, Gawanmeh A. Evaluating the effectiveness of distance learning in higher education during covid-19 global crisis: Uae educators’ perspectives. Contemp Educ Technol. 2021;

Jagtap MT, Tripathi RC, Jawalkar DK. Depth accuracy determination in 3-d stereoscopic image retargeting using DMA. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.

Pandey B, Sharma KP. Radar Transmogrification Technology: Support for Unmanned System. In: Proceedings - 2019 Amity International Conference on Artificial Intelligence, AICAI 2019. 2019.

Singh D. Robust controlling of thermal mixing procedure by means of sliding type controlling. Int J Eng Adv Technol. 2019;

Chow E. Ethical Hacking & Penetration Testing. IT Res Pap. 2011;

Anand V. Photovoltaic actuated induction motor for driving electric vehicle. Int J Eng Adv Technol. 2019;

Solanki MS, Goswami L, Sharma KP, Sikka R. Automatic Detection of Temples in consumer Images using histogram of Gradient. In: Proceedings of 2019 International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2019. 2019.

Solanki MS, Sharma DKP, Goswami L, Sikka R, Anand V. Automatic Identification of Temples in Digital Images through Scale Invariant Feature Transform. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.

Usha S, Jyothi MN, Sharadamma N, Dixit R, Devaraj VR, Nagesh babu R. Identification of microRNAs and their targets in Finger millet by high throughput sequencing. Gene. 2015;

Jain A, Jain S, Jain R, Kohli DV. Coated chitosan nanoparticles encapsulating caspase 3 activator for effective treatment of colorectral cancer. Drug Deliv Transl Res. 2015;

Ramos Brandão P. The Importance of Authentication and Encryption in Cloud Computing Framework Security. Int J Data Sci Technol. 2018;

Sah MK, Gupta DK, Rani P. Energy Efficient Routing Protocol for Wireless Sensor Networks with Multiple Sinks. In: Proceedings - 2015 2nd IEEE International Conference on Advances in Computing and Communication Engineering, ICACCE 2015. 2015.

Downloads

Published

2022-03-30

How to Cite

A Study on Ethical Hacking . (2022). International Journal of Innovative Research in Computer Science & Technology, 10(2), 435–438. https://doi.org/10.55524/