ETHICAL HACKING
Er. Chhungpuia Renthlei
Senior Technical Officer, NIELIT Aizaw
Ethical hacking awmzia chu permit nei thlapa thil tha tih nana hacking hi a ni.An mahni ruaitu te computer system an hack sak a, security that tawk lohna lai an hmuh te leh a thuam that dan report kimchang tak an pe thin. Ethical hacker te hi White hat hackers emaw, Red Team Experts tiin an vuah. An tum ber chu hacker laka system venhim a ni. sumdawng company leh bank ten cybercrime do let turin an ruai thin. Anihna takah chuan ethical hacker te hi Company network him lohna lai chhui chhuaktu leh data pawimawh venhimtu an ni. Cybercrime ten system an hack theih loh nan network security thuam tha tu an ni.
Ethical Hacking method chi hrang hrang te:
1.Website Hacking: Heng ho hian Website an zirchiang a, a fuh tawk lohna te leh cyber criminal ten an hack theih dan awm thei te an zawng chhuak a, an siam tha thin
2.Network Hacking: Computer inthlunzawmna leh data inthawnkual dan an zir chianga. Hacker laka venhim ngai ang ang te an thuam chak thin.
3.Wi-Fi Hacking: Wify hman a him leh him loh te, misual ten an lo hman ruk theih dan a awm leh awm loh an check thin. Him taka Wify hman theih turin an siam thin.
4.Tricking People (Social Engineering): A chang chuan information pawimawh pe chhuak turin company mite an bum der ve thin a. Bum theih an neih chuan heng an bum te hnenah hian awlsam taka buma awm lo nan turin fimkhur turin an hrilh leh thin.
5. Testing for Weaknesses (Penetration Testing): Company computer system leh software te tihchhiat an tum ngar ngar a, hacker te an lo hack khalh thin. An duh tawka an hack hnuah a venhim dan an duangchhuak thin.
6.Cloud Computing Security: Cloud hi digital storehouse lian tak a ni a, hacker te target ber a ni thin bawk.Cloud him leh him loh an check thin.
7.Mobile Hacking: Mobile leh a chhunga awm apps leh data venhim nan uluk takin an check thin.
8. IoT (Internet of Things) Hacking: Cyber criminal laka software hmanga hmanraw control theih (Smart device) venhimna a ni. Him taka internet kan hman theih nana hack chhinna a ni.
Engtinnge system an hack?
Organization te hian ethical hackers te hi an system leh network crimal te lake venhim nan an ruai thin. Hmanraw tha leh mithiam tak a ngai a, hna hautak leh khirh tak a ni. An tih dan hi hacker ten system an hack dan ang tho a ni a, Phase hrang hrang a awm a, tawi fel deuhvin han sawi ila.
1.Footprinting: Hei hi hacking hna hmasa ber a ni. White hat hackers te chuan an hack tur system leh network information atam thei ang ber an lakhawma, Dan naranin Network, host leh a hmangtu te data an lakhawm thin. Chi hnih a awm. An system hack tur te direct in an khawih a, Information an la chhuak a, hei hi Active footprinting an vuah. Tin, direct a system khawih lovin social media, public websites leh hmun dang atangin information an lakhawm thung bawk. Hei hi Passive footprinting an vuah
2.Scanning: An hack tur target chhiatna lai an zawng a.Hackers te chuan data pawimawh user accounts, credentials, IP addresses, etc. te an zawng chhuak a. Scanning hi chi thum a awm a. Port scanning: Network host a open ports, live systems service leh services hrang hrang an lakhawm a.Vulnerability scanning: An hack tur security that lohna lai leh tihchhiat awlsamna lai an zawng chhuak a, heng atang te hian hmanraw hrang hrang Netsparker, OpenVAS, Nmap e.t.c hmangin system tihchhiat an tum a. Network scanning: An hack tur target firewall, routers, networks leh network hmanraw hrang hrang an lakhawm thin
3.Gaining Access: Duhthusam information an lakkhawm hnuah hack dan tur ruahmanna(blueprint) leh network map an siam a. Hacking hrang hrang Phishing attacks, Brute force attack, Spoofing attack, Man in the middle attack, Dos attack, Session hijacking leh Buffer overflow attacks hmangin system chu an hack ta a. Network, programs, system leh access permissions zawng zawng an ruchhuak ta a.
4. Maintaining Access: An duh ang an neih hnuah an duh hun huna system khawih chhiat nan an dah tha a. An duh ang thlapa network khawih chhe turin an target system chu an hack char char thin.
5. Clearing Tracks: He phase ah hian security team ten an chhui chhuah theih loh nan an sulhnu an tireh vek a. Cache file, cookies leh log files an delete vek a, registries an thlak a, hack nana an folder leh software an install te an paih leh vek a, Open ports zawng zawng an khar vek bawk.
Organization te hian ethical hackers te hi an system leh network crimal te lake venhim nan an ruai thin. Hmanraw tha leh mithiam tak a ngai a, hna hautak leh khirh tak a ni. An tih dan hi hacker ten system an hack dan ang tho a ni a, Phase hrang hrang a awm a, tawi fel deuhvin han sawi ila.
1.Footprinting: Hei hi hacking hna hmasa ber a ni. White hat hackers te chuan an hack tur system leh network information atam thei ang ber an lakhawma, Dan naranin Network, host leh a hmangtu te data an lakhawm thin. Chi hnih a awm. An system hack tur te direct in an khawih a, Information an la chhuak a, hei hi Active footprinting an vuah. Tin, direct a system khawih lovin social media, public websites leh hmun dang atangin information an lakhawm thung bawk. Hei hi Passive footprinting an vuah
2.Scanning: An hack tur target chhiatna lai an zawng a.Hackers te chuan data pawimawh user accounts, credentials, IP addresses, etc. te an zawng chhuak a. Scanning hi chi thum a awm a. Port scanning: Network host a open ports, live systems service leh services hrang hrang an lakhawm a.Vulnerability scanning: An hack tur security that lohna lai leh tihchhiat awlsamna lai an zawng chhuak a, heng atang te hian hmanraw hrang hrang Netsparker, OpenVAS, Nmap e.t.c hmangin system tihchhiat an tum a. Network scanning: An hack tur target firewall, routers, networks leh network hmanraw hrang hrang an lakhawm thin
3.Gaining Access: Duhthusam information an lakkhawm hnuah hack dan tur ruahmanna(blueprint) leh network map an siam a. Hacking hrang hrang Phishing attacks, Brute force attack, Spoofing attack, Man in the middle attack, Dos attack, Session hijacking leh Buffer overflow attacks hmangin system chu an hack ta a. Network, programs, system leh access permissions zawng zawng an ruchhuak ta a.
4. Maintaining Access: An duh ang an neih hnuah an duh hun huna system khawih chhiat nan an dah tha a. An duh ang thlapa network khawih chhe turin an target system chu an hack char char thin.
5. Clearing Tracks: He phase ah hian security team ten an chhui chhuah theih loh nan an sulhnu an tireh vek a. Cache file, cookies leh log files an delete vek a, registries an thlak a, hack nana an folder leh software an install te an paih leh vek a, Open ports zawng zawng an khar vek bawk.
6. Reporting:Hei hi an hna kharna a ni. Network system that tawk lohna lai an hmuhchhuak zawk zawng te, an hack theih dan te leh siam that theih dan te ziakin report an siam a, an mahni ruaitu te hnenah an pe a. Network system neitu te nen uluk takin venhimna kawnga hmalak dan tur an sawi khawm a. Tichuan, Ethical Hacking tanpuina zarah Organization, Sorkar leh mimal ten Network system an venhim theih phah thin a ni.
0 Comments