In this Guide to Ethical Hacking, Matt Ford of Foursys sets out the definition, goals and processes involved in the use of ethical hacking.
Using practical examples, the guide covers the 5 key phases of hacking typically used by hackers to gain access to networks that IT Administrators all too often believe are secure.
The Guide offers often thought-provoking insights into the techniques and secrets of malicious hackers, such as:
- Initial network and system reconnaissance of target networks
- Scanning for possible areas of vulnerability
- Gaining and maintaining access
- Hiding the evidence of an attack