Skip to main content

Ten Important Rules Of Ethical Hacking

The world of ethical hacking too is bound by a set of rules and principles, here are 10 crucial ones! 

Time and again we have been bringing you valuable resources on ethical hacking since we know and understand the nature of things as far as security goes. Ethical hacking is picking up steam each day with more and more organisations spending heftily to maintain the sanctity of their systems and data. As such, ethical hacking is a glorious career option in the current scheme of things.



1.Set your goals straight

To begin with, an ethical hacker must start thinking like the intruder. He must be able to identify the loopholes on the target access points or networks that are prone to attack, he must be aware of the repercussions of these loopholes and how the intruder can use it against the same. An ethical hacker then has to find out if anyone at the target notice the intruder's attempts to carry out his/her acts. Finding out and eliminating unauthorised wireless access points is always the top most priority of an ethical hacker.

2.Plan your testing process

You can never be sure when something or the other comes along that could make you take a backseat. Money, personnel, or time is not in your hands, therefore constraints might knock on your door anytime without prior notice. As such, to avoid any untoward incidence, you must identify the networks you intend to test and decide before hand the time period for this process. Once the basics are set right you must specify a testing process that you'll carry out. Planning is crucial and sharing it with all the concerned personnel advisable. An approval of the testing process by all stakeholders involved is also necessary. 

3.Ask for permission

Getting permission for your deeds is a must to avoid any legal repercussions that might turn up against you in the future. This permission must be in written and must clearly state that you hold the authorised rights to carry out the particular test you intend for and that the said organisation will back you at all times in case any criminal charges come up against you. 

4.Work ethically, work professionally

Refrain from stepping out of the said plan, stick to the set goals and plan. Also, refrain from sharing any information regarding your plan and testing to anyone outside your set domain. As an ethical hacker you're bound to confidentiality and non-disclosure of events that unfold during your hacking process to anyone other than the organisation and concerned authority. 

5.Always keep records

Spending countless hours within the confines of a lowly-lit room with a computer and a piping pot of coffee doesn't mean you start to loose it with time. Always maintain formal records of what you do and what you test and what results you get. Notes can be either in paper or electronic, in all cases they must be well maintained.

6.Respect the privacy of others

You're bound to gain access to private information (encryption keys for instance) while on your quest, however, how you use this information is key to being a good ethical hacker and a good human being most importantly. Getting first hand information about others' private lives doesn't give you access to intrude. There's a thin line here that must not be crossed, with great power comes great responsibility, remember?

7.Respect others' rights

It's only human to be proud of your achievements. Once you get through a locked window, chances are you'd want to pry further. However, you must understand that your deeds must not cause harm to the rights of others. Also, use tools of the trade wisely. The same tool you use for an attack might in turn have long lasting implications, a denial of service for instance.


8.Use a scientific process

Follow a scientific/empirical approach while hacking. To begin with set a goal that is quantifiable, meaning you know when you've reached it rather than going around in circles. Your test must be consistent to your findings. If the same test brings out two different results when done twice in the same case scenarios, there's something terribly wrong about how you're going about it. 


9.Pick one tool and stick with it

The internet is rife with countless good tools to carry out your process, both free and commercial tools are available. However, rather than being overwhelmed by the sheer quantity, it's ideal you pick up one tool and stick with it.

10.Provide timely progress updates

Many a times the time duration of your test might extend beyond the set interval (over a week for instance). In all such cases, you must provide your organisation with progress updates from time to time rather than waiting for the process to reach a completion. 

Comments

  1. This ethical hacking tutorial is really important for software engineers. Thanks for posting.

    ReplyDelete
  2. This ethical hacking tutorial is really important for software engineers. Thanks for posting.

    ReplyDelete
  3. Mobile Phone Security Apps Assac Networks’ mobile phone/smartphone security app provides 360° protection against tapping and data theft from your mobile phone.

    ReplyDelete
  4. I must say life saving rules foe all hackers. a ton of information i gathered from this blog. CEH Training in India is a qualification obtained by assessing the security of computer. Good work.

    ReplyDelete
  5. Thanks, Learned a lot of new things from your post! Good creation and HATS OFF to the creativity of your mind.
    Very interesting and useful blog!
    Ethical Hacking Course in Gurgaon

    ReplyDelete
  6. It is really a great work and the way in which u r sharing the knowledge is excellent.You can also read: Ethical Hacking

    ReplyDelete
  7. Iam very happy after find this post and really thank you. Thanks for sharing this Informative content. Well explained. Got to learn new things from your Blog. Hacking is a very vast term and is divided into two categories. First is white-collar hacking which is legal and have some defined rules and other is black-collar hacking which is illegal almost everywhere. White-collar professionals are also called as ethical hackers who work with organizations and enterprises and help them in cyber security. There are certain options for ethical hacking and you can proceed with any certification.
    Top Ethical Hacker Certifications

    ReplyDelete
  8. Thanks for a marvelous posting! I definitely enjoyed reading it, you could be a great author.I will remember to bookmark your blog and may come back from now on. I want to encourage continue your great writing, have a nice Day! G1 driving lessons in Toronto

    ReplyDelete
  9. Awesome post. I’m a normal visitor of your web site and appreciate you taking the time to maintain the nice site. I’ll be a frequent visitor for a long time. Office removals in slough

    ReplyDelete
  10. Awesome write-up. I’m a regular visitor of your site and appreciate you taking the time to maintain the excellent site. I will be a frequent visitor for a long time. Environmental consultancy in London

    ReplyDelete
  11. Hi there. I found your website by means of oogle whilst looking for a similar topic, your site got here up. It appears great. I’ve bookmarked it in my google bookmarks to visit then. Rolling shutters London

    ReplyDelete
  12. It was really good.Keep up the good workCareer in ethical hacking is safest and most in demand. The entire world is now online and due to advancement in technology which also has lead to increase in cyber crimes.Role of Ethical Hackers is to prevent cyber- crimes. The demand for them is highest as very few Ethical Hackers available. Earlier ethical hacking is limited to the IT sector, now as all companies/organizations create their online presence, they require Cyber Security. Ethical hacking Jobs are available with both government and private organisations.If you want to join Indian cyber army and work with them for government,police agencies for that clear the Indian cyber army exam or get ethical hacking training from them.Indian cyber army also started cyber crime helpline number for those who become cyber victims.Visit the official website for more information.

    ReplyDelete
  13. This concept is a good way to enhance the knowledge.thanks for sharing. please keep it up. Kislay Chaudhary session at CDTS – “Investigation and Detection of Crime”

    ReplyDelete
  14. Ethical Hacking is the order of the day and protecting your data from harm is getting a widespread importance. If you live near or in Delhi, then worry not. There are several institutes which provide ethical hacking course in Delhi.

    ReplyDelete
  15. I must appreciate you for providing such a valuable content for us.The information is worth and very useful for the beginners. UiPath automation platform enables global enterprises to design, deploy and manage a full fledged robotic workforce that mimics employees in administering rules-based tasks and frees them from the daily routine of rote work. More Details About UiPath click here.

    ReplyDelete
  16. nice post.thanks for sharing the more valuable information.
    Indian Cyber Army credibility in Ethical hacking training & Cybercrime investigation training is acknowledged across nation as we offer hands on practical knowledge and full assistance with basic as well as advanced level ethical hacking & cybercrime investigation courses. The training is conducted by subject specialist corporate professionals with wide experience in managing real-time ethical hacking/ cyber security projects. Indian Cyber Army implements a blend of academic learning and practical sessions to give the candidate optimum exposure.Ethical hacking training ,
    Ethical hacking course

    ReplyDelete
  17. I like your post. Indian Cyber Army credibility in Ethical hacking training & Cybercrime investigation training

    ReplyDelete

Post a Comment

Popular posts from this blog

Here Are 7 Brilliant Cheat Sheets For Linux/Unix

There's nothing better than a cheatsheet when you are stuck and need a reference. So here bringing to you 7 brilliant free cheat sheets. 




1. Unix Tool Box: An incredibly exhaustive reference for all things Linux. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.

2. One page Linux Manual: Great one page reference to the most popular Linux commands, it is a summary of useful Linux commands.

3. Linux Reference Card: One great reference published by FOSSwire.

4. Linux Command Line Cheat Sheet: This is an interestingly sorted and helpful cheat sheet by cheatography.

5. Linux Command Line Tips: This is a linux command line reference for common operations. Cleanly sorted and well described.

6. Treebeard’s Unix Cheat Sheet: A great reference that shows command comparisons with that of DOS. So if you are someone who was a DOS user and has switched to Linux, this is the best one too have!

7. Linux Shortcuts and Commands:…

Extracting Administrator Passwords Using LCP

Extracting Administrator Passwords Using LCP
Link Control Protocol (LCP) is part of the Point-to-Point (PPP) protocol In PPP communications, both the sending and receiving devices send out LCP packets to determine specific information required for data transmission.
■ Use an LCP tool ■ Crack administrator passwords
Tools Needed
■ A computer running Windows Server 2012 ■ A web browser with an Internet connection ■ Administrative privileges to run tools
■ You can also download the latest version of LCP from the link http: / www.lcpsoft.com/engl1sh/1ndex.htm
■ If you decide to download the latest version, then screenshots shown     might differ ■ Follow the wizard driven installation instructions ■ Run this tool in Windows Server 2012 ■ Administrative privileges to run tools ■ TCP/IP settings correctly configured and an accessible DNS server
Overview of LCP
LCP program mainly audits user account passwords and recovers them in Windows 2008 and 2003. General features of this protocol are password recovery, bru…