Skip to main content

Posts

Showing posts from 2018

Information Security Overview in securetecho

Information Security Overview in securetecho Malware Trends  in 2018 Source code leaks  accelerated malware release cycles                                                  Attackers create new variants of malware variants   Contains new characteristics, signatures, evasive capabilities, etc.                       Anti-virus/anti-malware cannot d etect Old school malware techniques  made a comeback                                                      Anti-virus applications、IDS、firewall and cyber-crime techniques                    Forcing an attacker to use artificial and time consuming ol...

Ethical Hacking Concepts and Scope in securetecho

1.4 Ethical Hacking Concepts and Scope in Securetecho What is  Ethical Hacking ? Ethical hacking involves the use of hacking tools, tricks, and techniques to  identify vulnerabilities  so as to ensure system security. It focuses on simulating techniques used by attackers to  verify the existence of exploitable vulnerabilities  in the system security. Ethical hackers performs security assessment of their organization  with the permission of concerned authorities . Why  Ethical Hacking  is Necessary To beat a hacker, you need to think like one! Ethical hacking is necessary as it  allows to counter attacks from malicious hackers  by anticipating methods used by them to break into a system. Reasons why Organizations Recruit Ethical Hackers : To  prevent hackers  from gaining access to organization's information. To  uncover vulnerabilities  in systems and explore their potential as a risk. To an...

Concept of hacking,phases and its types in securetecho

1.3 Hacking Concepts, Types, and Phases in securetecho What is Hacking ? Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources. It involves modifying system or application features to achieve a goal outside of the creator's original purpose. Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss . Who is a Hacking ? Intelligent individuals with excellent computer skills, with the ability to create and explore into the computer's software and hardware. For some hackers, hacking is a hobby to see how many computers or networks they can compromise. Their intention can either be to gain knowledge or to poke around to do illegal things. Some do hacking with malicious intent behind their escapades, like stealing business data, credit card information, social security numbers, email passwords, etc. Hack...

CEH V9 Module in securetecho

CEH_v9              Introduction  in securetecho Chapter 01. Introduction to Ethical Hacking 1.1 Information Security Overview 1.2 Information Security Threats and Attack Vectors 1.3 Hacking Concepts, Types, and Phases 1.4 Ethical Hacking Concepts and Scope 1.5 Information Security Controls 1.6 Information Security Laws and Standards Module Summary Chapter 02. Footprinting and Reconnaissance 2.1 Footprinting Concepts 2.2 Footprinting Methodology 2.2.1 Footprinting through Search Engines 2.2.2 Footprinting Using Advanced Google Hacking Techniques 2.2.3 Footprinting through Social Networking Sites 2.2.4 Website Footprinting 2.2.5 Email Footprinting 2.2.6 Competitive Intelligence 2.2.7 WHOIS Footprinting 2.2.8 DNS Footprinting 2.2.9 Network Footprinting 2.2.10 Footprinting through Social Engineering 2.3 Footprinting Tools 2.4 Footprinting Countermeasure...