Unlocking Security : The World of Ethical Hacking

Authors

  • Suthar Bhavik  Department of Computer Science, Shri C. J Patel College of Computer Studies (BCA), Sankalchand Patel University, Visnagar, Gujarat, India
  • Mansi Luhariya  Department of Computer Science, Shri C. J Patel College of Computer Studies (BCA), Sankalchand Patel University, Visnagar, Gujarat, India
  • Dr. Darshanaben Dipakkumar Pandya  Associate Professor, Department of Computer Science, Shri C. J Patel College of Computer Studies (BCA), Sankalchand Patel University, Visnagar, Gujarat, India
  • Dr. Abhijeetsinh Jadeja  I/C Principal, Department of Computer Science, Shri C. J Patel College of Computer Studies (BCA), Sankalchand Patel University, Visnagar, Gujarat, India

DOI:

https://doi.org/10.32628/IJSRSET2310666

Keywords:

Hackers, Malware, Ethical Hackers, MiTM, DoS, Phishing, Wi-Fi phishing, Code of conduct

Abstract

As nowadays all the information is available online, a large number of users are accessing it, some of them use this information for gaining knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the knowledge of the owner. The purpose of this paper is to tell what is hacking, who is hackers, what is ethical hacking, what is the code of conduct of ethical hackers and the need of them. A small introduction of Linux Operating System is given in this paper. All the techniques are performed on the Linux operating system named Kali Linux. After this some basic hacking attacks covered in the paper are MiTM Attack (Man in The Middle Attack), Phishing Attack, DoS Attack (Denial of Services Attack). Further what is Wi-Fi, what are the techniques used in the Wi-Fi protection and the methods used by the hackers to hacks Wi-Fi passwords is covered in the paper.

References

  1. Is Ethical Hacking Ethical “ ?,” Int. J. Eng. Sci. Technol., 2011.
  2. S.P. Oriyano, “Introduction to Ethical Hacking,” in CEHTMv9, 2017.
  3. B. Sahare, A. Naik, and S. Khandey, “Study of Ethical Hacking,” Int. J. Comput. Sci. Trends Technol., 2014.
  4. S. Patil, A. Jan gra, M. Bhale, A. Raina, and P. Kulkarni, “Ethical hacking: The need for cyber security,” in IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017, 2018, doi: 10.1109/ICPCSI.2017.8391982.
  5. G. R. Lucas, “Cyber warfare,” in The Ashgate Research Companion to Military Ethics, 2016.
  6. P. Engebretson, “Reconnaissance,” in The Basics of Hacking and Penetration Testing, 2011.
  7. Ehacking, “Scanning and Enumeration- Second Step of Ethical Hacking,” ehacking, 2011.
  8. R. Baloch, Ethical Hacking and Penetration Testing Guide. 2017.
  9. Hackers? Norton, “What is the Difference Between Black, White and Grey Hat ” Emerging Threats, 2019.
  10. S. Tulasi Prasad, “Ethical Hacking and Types of Hackers,” Int. J. Emerg. Technol. Comput. Sci. Electron., 2014.

Downloads

Published

2024-01-02

Issue

Section

Research Articles

How to Cite

[1]
Suthar Bhavik, Mansi Luhariya, Dr. Darshanaben Dipakkumar Pandya, Dr. Abhijeetsinh Jadeja "Unlocking Security : The World of Ethical Hacking " International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 11, Issue 1, pp.41-45, January-February-2024. Available at doi : https://doi.org/10.32628/IJSRSET2310666