THE ART OF EXPLOITATION
The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help.
ETHICAL HACKING: Information security is the fastest growing area in the Information Technology (IT) sector. Security would be an easy process if all that had to be done is to install a fire wall and anti - virus software, but the reality is that securing information requires a multi - layered approach. Obtaining this requires adopting measures to prevent the unauthorised use, misuse, modification or denial of use of knowledge, facts, data, or capabilities and it requires taking a proactive approach to manage the risk. This is where ethical hackers come into real play. Ethical hacking is an "art" in the sense that the "artist" must possess the skills and knowledge of a potential attacker (to imitate an attack) and the resources with which they mitigate the vulnerabilities used by attackers. Ethical hacking is the process of analyzing the imposed threat on a given system or network by modelling the actions of an adversary. This paper