Topic is in the paper instructions
Due to the increase of cyber attacks, there is high demand for information security experts who possesses actual ethical hacking and network penetration testing skills. There are several ethical hacking tools used by these experts to enable them to penetrate and test networks as described below.
This has been the best used hacking tool ever, which contains a database that comprises lists of available exploits. This tool’s structure is a sub project used to run exploit code against another machine to get the desired task done.
This is a tool that offers a free source effort in providing user-friendly interface when using Metasploit tool. It has demonstrations that are so much convincing and enables the hacker to study the vulnerable and weak machines in the network in a short moment.
This is a tool used to experiment the WiFi security in the easiest way. It is programmed in Python and executes in every platform. The ethical hacker is only required to supply the WiFi interface used in a given organization and the tool does the job by confirming that the company wireless network is configured in relation to the appropriate Security Policy. The tool is also used in identifying all open as well as accessible networks which may be potentially risky in terms accessing sensitive information (Engebretson, 2013).
White hat: This is an expert on network and computer whose work is to penetrate security systems as a leisure pursuit or on behalf of their owners, as he seeks weaknesses that a harmful hacker might exploit.
Grey hat: This is an experienced hacker who at one time acts legally and at other times does not.
Yes, it is possible to have ethical hacking where it is applied as a positive function to assist system owners recognize some weaknesses, which can encourage unethical hackers to penetrate the system (Engebretson, 2013).
Engebretson, P. (2013). The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. United States: Elsevier