Chapter 4

Hacking Methodology

In This Chapter

arrow Examining steps for successful ethical hacking

arrow Gleaning information about your organization from the Internet

arrow Scanning your network

arrow Looking for vulnerabilities

Before you dive in head first with your ethical hacking, it’s critical to have at least a basic methodology to work from. Ethical hacking involves more than just poking and prodding a system or network. Proven techniques can help guide you along the hacking highway and ensure that you end up at the right destination. Using a methodology that supports your ethical hacking goals separates you from the amateurs. A methodology also helps ensure that you make the most of your time and effort.

Setting the Stage for Testing

In the past, a lot of ethical hacking involved manual processes. Now, certain vulnerability scanners can automate various tasks, from testing to reporting to remediation validation (the process of determining whether a vulnerability was fixed). These tools allow you to focus on performing the tests and less on the specific steps involved. However, following a general ...

Get Hacking For Dummies, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.