Penetration Testing and Ethical Hacking (Archive) Notes

Join Cybrary

Module 02 - Footprinting (Click to View Notes)

Change the bytes of the data to trigger replies versus the replies being ignored. This is a ping test on WINDOWS, NOT Linux. [view]

Module 03 - Scanning (Click to View Notes)

nslookup from attacker machinecheck on victim machine if its correctns lookup on windows, you can set type of query to "mx". Double check the queries between both the attacker machine and victim to match the authority rcords.refresh, retryt, expire, [view]

Module 04 - Enumeration (Click to View Notes)

NTP = TIming componentSMB = server message boxDNS = domain nameSMTP = emailSNMP = simple network management protocolPUB (SMTP) = wealth of information, management informatonconsier VNC if other ports are not open [view]

Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?