Penetration Testing and Ethical Hacking Notes

Lecture 1

Five phases of penetration testing. 1. Footprinting/ reconnaisse 2. scanning 3. Gaining access 4. Maintaining Access 5. Submit Report [view]

By: ashraf01920 | Related Lesson: The Five Phases of Penetration Testing | Modified: April 2, 2018

phase 1

Footprinting [view]

By: medattaouile | Related Lesson: Footprinting (Whiteboard) | Modified: April 2, 2018

Foot printing Theory

Target – Company, Person, etc. They might have Firewalls, preventing mechanism, to stop them from having information disclosed. Can find targets by: -Internal DNS -Private Websites -Dumpster Diving -Shoulder Surfing -Eaves Dropping [view]

By: xavco2424 | Related Lesson: Footprinting (Whiteboard) | Modified: April 1, 2018

Pen Testing

Phase 1 – Reconnaissance – reaching out to targets Phase 2 – Scanning, finding more info, using disclosure to an advantage. Port scanners, vulnerabilities scanners. Phase 3 – Gaining access, (performing hack/exploit) Phase 4 & [view]

By: xavco2424 | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

Ph

The five phases are; Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks. [view]

By: annepek | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

1

compile c program – gcc file.c -ggdb [-o outputfile.txt]  [] – optional?  not sure how to form run command what’s being exploited? How is this overtaking the memory? How can I input specific values into specific pieces of memory? [view]

By: testing223 | Related Lesson: stack Lab | Modified: April 1, 2018

nslookup command

nslookup www.google.com > 172.217.21.68 [view]

By: mouadalouani | Related Lesson: nslookup Lab | Modified: April 1, 2018

Foot-Printing

Foot-printing Sources: http://anywho.com/ Usman Ali Spokeo www.yasni.com   [view]

By: usmanaliofficial | Related Lesson: AnyWho Lab | Modified: April 1, 2018

rly

u thought i was going to do notes? [view]

By: sdadasd | Related Lesson: Footprinting (Whiteboard) | Modified: April 1, 2018

STUDY

Y     E   A   R    S ,.///////////////////// SD [view]

By: jackie3797 | Related Lesson: SQL Injection (White Board) | Modified: April 1, 2018

« First ‹ Previous 1 11 101 109 110 111 112 113 121 211 3732 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel