• What is Penetration Testing
  • What are cyber-attacks
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet190/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   186   187   188   189   190   191   192   193   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Grey hat hackers
    Grey hat hackers are a special category of hackers who are not into the bad
    game but are willing to help the bad guys to play. These types of hackers
    usually have fun in detecting vulnerabilities. When they detect a
    vulnerability, they will sell that information in a dark web which will
    further be abused by many black hat hackers. However, these people will
    not exploit the system by their won due to various reasons.


    Through this explanation, we have got a deep understanding of the different
    types of hackers. In the next section, we will have a brief description about
    penetration testing.
    What is Penetration Testing?
    Penetration testing is a technical name that lets users find loopholes in the
    system to fix them. Usually, security researchers perform penetration testing
    attacks to help the company. 
    Penetration testing tool kit 
    Kali Linux provides a lot of tools for penetration testing in its resources. As
    explained before there are a lot of stages that need to be performed to
    confirm that the system is completely safe from any attacks. For this
    purpose, you need to perform all the penetration tasks like scanning,
    vulnerability testing, mock exploiting. It is better and safe if you can
    maintain a backup procedure for all the data that is present .
    In the next section, we will discuss some of the famous cyber-attacks that
    had happened. This is theoretical information and can help you understand
    the scope of hacking and threats hacking may possess to both economic and
    safety prospects. 
    What are cyber-attacks?
    The Internet is a weird and dangerous place. A lot of people try to find the
    real place of the internet which is buried deep beneath the dark web. The
    dark web is a place that cannot be accessed by normal browsers like chrome
    in any way. To access dark web websites, you need to use the TOR browser,
    about which we have discussed already. 
    Dark web consists of a lot of websites that sell stolen information by
    hackers. This is where hackers who have found a loophole in a famous
    system will try to take advantage of it by selling it to other hackers. A lot of
    cyberattacks happen for two reasons. Out of them, one is money and the
    other is cyberwar between countries. 


    You might have heard about ransomware virus that had spread into millions
    of systems a few years back. This is a perfect example of a cyber-attack.
    Here are the top three cyberattacks that have happened in the last decade or
    so.

    Download 6,34 Mb.
    1   ...   186   187   188   189   190   191   192   193   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish