Ethical Hacking


What is Ethical?

flowchart TD subgraph "with Permission"; A[Ethical] --> C(White Hat); A --> J(Ehtical Hacker); end; C --> F(Gray); D(Black Hat) --> F; F --> H(Hacktivists); F --> I(State-Sponsored); subgraph "without Permission"; B[Unethical] --> D; B --> E(Script Kiddies); B --> G(Terrorists); end;

Certificates

Branches

graph LR A[Ethical Hacking] --> B(Footprinting); A --> C(Password Cracking); A --> D(Evade Detection); A --> E(Hide Files); A --> F(Networking); A --> G(Protection);

Resources

References


  1. Install and Use Wireshark on Ubuntu Linux
  2. Airmon-ng
  3. How to Check If Your Wireless Adapter Supports Monitor Mode
  4. Malware uses WiFi BSSID for victim identification