Penetration Testing and Ethical Hacking Notes

ping command

type ping /?  type ping web address ping -n 2 website ping -i  4 website – i or time to live -a host name resolution   [view]

By: 123monster123 | Related Lesson: Ping Lab | Modified: April 3, 2018

note1

5 types:- Pen 1. Fining the host  2.Gaining the access 3. 4. Trackinaccessccerss 5. Covering the access [view]

By: sahinsiddique | Related Lesson: The Five Phases of Penetration Testing | Modified: April 3, 2018

L15

when reach a target we have these options : layer 2(arp) and layer 3 (routing)   netw resources (tcp/ip, netbios etc) services (windows, linux etc) names (dns or else) app banners(have some app code from app banner) passwds  os’s( win, lin,ma [view]

By: ashraf01920 | Related Lesson: Enumeration (Whiteboard) | Modified: April 3, 2018

web data extractor

web extractor–download and install start–specify the URl and the things to extract view-show session info select search engines too start-session settings look at them properly all [view]

By: khyashiva | Related Lesson: Web Data Extractor Lab | Modified: April 3, 2018

path analyzer

path analyzer pro [view]

By: Elyass Rahimi | Related Lesson: Path Analyzer Pro Lab | Modified: April 3, 2018

L 14

Enumeration is the first attack on target network; Enumeration is a process to gather the information about user names, machine names, network resources, shares and services ; Enumeration makes a fixed active connection to a system. [view]

By: ashraf01920 | Related Lesson: Introduction to Enumeration | Modified: April 3, 2018

Footprinting

Footprinting with this lecture video. Footprinting is the blueprinting of the security profile of an organization. It is designed to profile an organization with respect to its networks. Transcript [view]

By: DARKNIGHTSUBHANKAR | Related Lesson: Footprinting (Whiteboard) | Modified: April 3, 2018

L12

 web data extractor: download it and start it and type website name   [view]

By: ashraf01920 | Related Lesson: Web Data Extractor Lab | Modified: April 3, 2018

Foot printing

Foot printing is a very important concept in penetration testing in which tester documents all the information from variety of sources.  [view]

By: Akanksha Lal | Related Lesson: Introduction to Footprinting | Modified: April 3, 2018

nslookup lab

nslookup www.cybrary.com type=a type=SOA server: 8.8.8.8 nslookup www.cybrabry.it notepad file.txt [view]

By: Elyass Rahimi | Related Lesson: nslookup Lab | Modified: April 3, 2018

« First ‹ Previous 1 3 93 101 102 103 104 105 113 203 3731 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel