The ethical hacking project comprises three phases, summarized as follows:

1. Preparation: In this phase, a formal contract that contains a non-disclosure clause as well as a legal clause to protect the ethical hacker against any prosecution that he may face during the conduct phase is signed. The contract also outlines the infrastructure perimeter, evaluation activities, time schedules, and resources available to the ethical hacker.
2. Conduct: In this phase, the evaluation technical report is prepared based on testing potential vulnerabilities.
3. Conclusion: In this phase, the results of the evaluation is communicated to the organization and corrective action is taken if needed.

Explore More

LDAP Injection Vulnerabilities

LDAP Injection Overview LDAP Injection attacks are not as common as the other types of injection attacks, but if your product uses an LDAP server this must be tested. An

FEMA Phones Get Hacked

If you are going to hack a phone system, do you really want to hack the Department of Homeland Security? That’s what happened this weekend when someone made hundreds of

What are the components of a security evaluation?

Any security evaluation involves three components: * Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure