The ethical hacking project comprises three phases, summarized as follows:

1. Preparation: In this phase, a formal contract that contains a non-disclosure clause as well as a legal clause to protect the ethical hacker against any prosecution that he may face during the conduct phase is signed. The contract also outlines the infrastructure perimeter, evaluation activities, time schedules, and resources available to the ethical hacker.
2. Conduct: In this phase, the evaluation technical report is prepared based on testing potential vulnerabilities.
3. Conclusion: In this phase, the results of the evaluation is communicated to the organization and corrective action is taken if needed.

Explore More

Critical Blind SQL Injection and Persistent XSS Vulnerability in Airmandalay http://www.airmandalay.com

PlanetCreator has reported another Critical Blind SQL Injection and Persistent XSS Vulnerability in Myanmar (Burma) Domestic and International Airline, Myanmar Domestic Flight http://www.airmandalay.com Cross-site scripting (XSS) is a type of

How to Hack a Window XP Admins Password

This is a cool little computertrick for Microsoft Windows trick I’ve picked up in my travels and decided to share it with you fine and ethical individuals =). Log in

How does a cross site scripting (XSS) attack work?

A cross site scripting attack works in the following manner: * The attacker identifies a web site that has one or more XSS bugs for example, a web site that