This document discusses ethical hacking. It defines hacking and ethical hacking, provides a brief history of hacking from the 1960s to 1990s, and describes the different types of hackers including white hat, black hat, and grey hat. It then outlines common hacking methods and the process of ethical hacking which includes preparation, footprinting, enumeration and fingerprinting, vulnerability identification, and attack/exploitation. The document notes pros of ethical hacking like finding problems and risk management, and cons such as only a snapshot and false sense of security. It concludes that testing is essential for security and ethical hacking can reduce exposure to criminal hackers.
Related topics: