In This Chapter
Examining steps for successful ethical hacking
Gleaning information about your organization from the Internet
Scanning your network
Looking for vulnerabilities
Before you dive in head first with your ethical hacking, it’s critical to have at least a basic methodology to work from. Ethical hacking involves more than just poking and prodding a system or network. Proven techniques can help guide you along the hacking highway and ensure that you end up at the right destination. Using a methodology that supports your ethical hacking goals separates you from the amateurs. A methodology also helps ensure that you make the most of your time and effort.
Setting the Stage for Testing
In the past, a lot of ethical hacking involved manual processes. Now, certain vulnerability scanners can automate various tasks, from testing to reporting to remediation validation (the process of determining whether a vulnerability was fixed). These tools allow you to focus on performing the tests and less on the specific steps involved. However, following a general ...