Ethical Hacking, often described as information security is what it sounds like. It’s hacking to improve an organization’s systems and network security. The word hacking has developed a negative connotation even though hacking is really nothing more than taking something apart to see how it works.
If you ever took apart a car, a radio, a computer and put it back together again then you are a hacker. The word Hacker started becoming a negative word when the media labeled those who illegally broke into an organization’s system or network without the organization’s knowledge. In reality they should have been labeled criminals but there are actual terms that reference people who use their hacking skills for malicious purposes. That’s one of the first lessons we will talk about.
You have probably already done some forms of ethical hacking. If you are on this site then it is likely that you are familiar with browsing the internet. When going for a job it’s always recommended that you research the company and get to know as much as possible about them before the interview. What do you do to get that information? Most likely you take to Google and research different websites, including the company site and social media, to get information.
Before making a major purchase you probably do your due diligence and research the product, the company behind it, and the reviews for the product. You gather as much information as possible including the competition’s comparable product.
If you have done either of these, or something similar then you have performed steps that are part of the reconnaissance phase of Ethical Hacking. This is an earlier phase in Penetration Testing. Before you begin the process of gaining access to an organization’s systems you get as much information as possible, and document it.
We’ll be talking about every section of the Certified Ethical Hacker program. There are 20 very in depth sections. You will need some tools to completely follow along. Some of the tools are free, some are not. You will want systems to practice on (ideally virtual machines). While it’s not entirely necessary you will most likely want to get familiar with Linux and some programming (hence the other 2 purposes of this site).
Hackers…start your engine.