What kind of actions and procedures differentiates an ethical hacker from a malicious hacker?

Question 1

Below list shows the five phases of hacking in random order. Place them in the correct order into the table below:

1. Covering Tracks

2. Gaining Access

3. Maintaining Access

4. Reconnaissance

5. Scanning and Enumeration

Below list shows actions/methods/tools that are used within five hacking phases. Select three of them for each hacking phase, and fill out the table below accordingly.

1. Backdoors

2. Buffer overflow

3. Dumpster diving

4. Hide files

5. Login a wireless access point with the default password

6. Network mapper

7. Network Sniffing

8. Ping sweep

9. Port scan

10. Remove log files

11. Rootkits

12. SQL injection

13. Trojans

14. Use VPN

15. Watch the outside of the building

Describe each of the phases in one or two sentences.

Place phases into this column in the correct order.Action-1Action-2Action-2
Phase-1
Phase-2
Phase-3
Phase-4
Phase-5

Question 2

What kind of actions and procedures differentiates an ethical hacker from a malicious hacker?

× How can I help you?