logo

Ethical Hacking and Penetration Testing : Black box and White box testing

   

Added on  2022-08-12

11 Pages1241 Words36 Views
 | 
 | 
 | 
Running head: Ethical hacking and penetration testing
Ethical hacking and penetration testing
Name of the Student
Name of the University
Author Note
Ethical Hacking and Penetration Testing : Black box and White box testing_1

Ethical hacking and penetration testing 1
Table of Contents
Introduction:...............................................................................................................................2
Difference between white box testing and Black box testing:...................................................2
Password cracking:.....................................................................................................................2
John the Ripper:.........................................................................................................................3
Importance of hashing:...............................................................................................................3
Conclusion:................................................................................................................................4
References:.................................................................................................................................5
Ethical Hacking and Penetration Testing : Black box and White box testing_2

Ethical hacking and penetration testing 2
Introduction:
The penetration testing is designed for testing the security of own system before the
hacker does. The tools of penetration testing can simulate the attack scenarios of real world
for exploiting and discovering the gaps in security which may lead to stole intellectual
property, personally identifiable information, cardholder data and records, protected health
information, personal data ransom, compromised credentials or any other harmful business
related outcomes (Capuani & Jørgensen, 2019). The purpose of this paper is to discuss about
black box and white box testing. The paper will also discuss about the importance of hashing
and for instance a popular password cracking tool John the ripper will be discussed.
Difference between white box testing and Black box testing:
The white box testing is basically a method that can check the inner functionalities of
a software system. In this technique, testing is on the basis of the coverage of branches,
statements of the code, conditions or paths. It can be said that the white box testing is a low
level testing. This is also known as glass box, clear box or code base and transparent box
testing. On the other hand, the black box testing, the person who will test the system will not
be having any information that are about the innner working information about the software
system. The black box testing a very high level of testing (Jan et al., 2016)). The primary
focus of the black box testing is to check the behaviour of the system. It is involving testing
from end user perspective or external user perspective. This type of testing can be used
virtually to each and every level of software testing that includes integration, unit, accepting
and system.
Ethical Hacking and Penetration Testing : Black box and White box testing_3

Ethical hacking and penetration testing 3
Password cracking:
A passcode is actually a secret word or phrase which is utilized for the authentication
procedure in several applications. The passwords are utilized for gaining access to the
resources and accounts. The passwords can protect the resources and accounts from the
accesses that are unauthorised. Cracking a password can open the way to enter into the
system to gain access to the data and information that are stored in the system (Valois et al.,
2019). The password cracking is basically is procedure for recovering and guessing a
passcode from the data transmission system and from the stored location. The tools can be
utilized for getting a passcode from the sources and accesses that are unauthorised or for
recovering a forgotten passcode. In the pen testing, it is utilized for checking the initial
security of an application.
John the Ripper:
John the ripper is software tool, which is a basically free password creaking software.
For UNIX the operating system this is initially developing for the software. This system
running on many platforms like WIN32, OpenVMS, DOS and many more, total of fifteen
(Hranický et al., 2017). John the ripper is the one of the most highly used software for
breaking programs and password testing. In this system the software combines all the number
or the password creaking things in a one package, which was including a customizable
cracker and auto detects the password hash types (Yisa, Baba & Olaniyi, 2016). Various
encrypted password which can be run against the software formats the hash types password
which includes the several Crypt by found on windows NT/2000/XP/2003 LM hash,
Kerberos AFS and various UNIX versions based on Blowfish, DES or MD5. In this system
the software includes MYSQL, LDAP and MD4 based password hashes which extended the
ability by using the additional modules.
Ethical Hacking and Penetration Testing : Black box and White box testing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
MN623 Password Cracking | Assignment
|11
|836
|16

Ethical Hacking and Penetration Testing : Presentation
|10
|689
|39

Analysis on Cyber Security 2022
|5
|1240
|21

Cyber Security and Analysis
|7
|1346
|44

Demonstration of penetration testing tools
|5
|1455
|19

Password Testing And Breaking Programs
|2
|655
|19