Journal Press India®

Ethical Hacking and Its Countermeasures

Vol 2 , Issue 3 , July - September 2014 | Pages: 41-49 | Research Paper  

https://doi.org/10.51976/ijari.231408

| | |


Author Details ( * ) denotes Corresponding author

1. * Shubham Goel, Department of Electrical and Electronics, Amity School of Engineering, Noida, Uttar Pradesh, India (shubhamgoel445@gmail.com)
2. Kunal Gupta, Department of Production and Industrial Engineering, DTU (Formerly DCE), New Delhi, Delhi, India
3. Mayank Garg, Department of Electrical and Electronics, Birla Institute of Technology and Science, Pilani, Rajasthan, India
4. A. K. Madan, Department of Production and Industrial Engineering, DTU (Formerly DCE), New Delhi, Delhi, India

In today‘s world the explosive growth of the Internet has brought many good things such as E-commerce-banking, E-mail, Cloud Computing. Most organizations, governments are linked to the internet in some way or the other, but the question arises ‗how safe are they‘. There is also a Dark side to all the progress such as Hack-ing, creation of Backdoors, phishing etc.This paper elucidates in brief about what hacking is, discusses its scope, types of hackers and the techniques employed by them. Itarticulates on the growing trend of smart mailers, which can send mails from any possible email,working with Kali which is an offensive software penetration tool and a provides a demonstration of SQL injection and various vulnerabilities still existing in today‘s sites. The paper also lays out the example of various gaping vulnerabilities found by the authors of this paper in govern-ment websites. Hacking is the first big problem faced by Governments, companies, and private citizens alike around the world. Hackers today are invading privacy like reading e-mail, stealing credit card number shopping sites, and putting it out on the web for everyone to see. The paper and other discussions help the common people and organizations to understand the loopholes, and even if the people can‘t rectify it least they can pre-vent themselves.

Keywords

Packet Sniffer; Rootkit, Reconnaissance; Social Engineering; Network Enumeration; Trojan Horses; Backdoor; SQL Injection; Kali Linux


  • Taylor, Paul A. Hackers. Routledge. 1999, ISBN 978-0-415-18072-6.

  • Kevin Beaver Hacking For Dummies. (January 12, 2010). ISBN 978-0-7645-5784-2.

  • Richard Conway, Julian Cordingley. Code Hacking: A Developer's Guide to Network Se-curity. ISBN 978-1-58450-314-9.

  • Johanna Granville, Dot. Con: The Dangers of Cyber Crime and a Call for Proactive Solutions, Australian Journal of Politics and History, 49(1). (Winter 2003), 102–109.

  • Katie Hafner, John Markoff (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. Simon & Schuster. ISBN 0-671-68322-5.

Abstract Views: 2
PDF Views: 362

Advanced Search

News/Events

Indira School of Bus...

Indira School of Mangement Studies PGDM, Pune Organizing Internatio...

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.