Posts

Showing posts from April, 2020

10 gadgets every white hat hacker needs in their toolkit

Image
10 gadgets every white hat hacker needs in their toolkit Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies, network segmentation, antivirus, and user awareness, to name just a few measures, are being applied properly. That’s when, in order to continue the analysis from the perspective of a security researcher or consultant,  social engineering  and a number of other tools, some of which we will look at in this post, start to play more importance, being perhaps the only ones that can allow an attacker to penetrate the target system. The tools in question are mainly pieces of hardware designed for   security research  or projects. So here’s a list of the 10 tools every white hat hacker needs. #1 Raspberry Pi 3 Raspberry Pi 3 Model B. Source:  raspberrypi.org We are now on the third generation of these low-budget computers, which...

How to Become a Ethical Hacker

Image
How to Become a Ethical hacker The word ‘hacker' originally defined a skilled programmer proficient in machine code and computer operating systems. Today, a 'hacker' is a person who consistently engages in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice. Hacking is the practice of modifying the features of a system, to accomplish a goal outside of the creator's original purpose. What is Ethical Hacking? The term ‘hacking’ has very negative connotations, but that's only until the role of an ethical hacker is fully understood. Ethical hackers are the good guys of the hacking world, the ones who wear the "white hat". So what does the role of an ethical hacker entail? Instead of using their advanced computer knowledge for nefarious activities, ethical hackers identify weaknesses in  data computer security  for business and organizations across the globe, to ...