Penetration Testing and Ethical Hacking Notes

Introduction to Footprinting

Foot-printing is documenting information such as websites, directories, emails, systems (ip addresses & domain names). What types of exploits can use this information. Use public registration (DNS & email) [view]

By: rhageboeck | Related Lesson: Introduction to Footprinting | Modified: April 1, 2018

Phases of Penetration

Phase 1: Recognizance (Active & Passive) Phase 2: Scanning Phase 3: Gaining Access Phase 4: Maintaining Access Phase 5: Covering tracks (repeat) [view]

By: rhageboeck | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

vid 1

phase 1 : reconnaissance phase 2: scanning phase 3: gaining access phase 4: maitaining access phase 5: maintaining reports [view]

By: imraanahamed29 | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

third note

Back Ground of foot printing setting the target . INTERNAL: internal dns private websites dumpster diving(attack) shoulder surfing( right at the reception ) eaves dropping(any center to have access) EXTERNAL: Phone network website Email Header *GOOGL [view]

By: negi19917 | Related Lesson: Footprinting (Whiteboard) | Modified: April 1, 2018

second note

 foot printing: in the world of penetration tests it is one of the major role . eg: organisational websites threats: could be used in social engineering acts tools and technqiues:   [view]

By: negi19917 | Related Lesson: Introduction to Footprinting | Modified: April 1, 2018

fport LAB

*Is compatible with windows XP, 2000 and NT only. **Use netstat -anob in CMD (administrator mode) to see PIDs, protocols, names, connection status,etc. of executables. Type where ”filename” to find an executable’s position (works on [view]

By: | Related Lesson: fport Lab | Modified: April 2, 2018

Introduction to trojans

We create trojans with the concept of troy.Here, we have an overt and covert application.Overtly, we put an application or some distraction in front of the end user and covertly we drop a backdoor to get access to the end user system.Trojans require [view]

By: | Related Lesson: Introduction to Trojans | Modified: April 1, 2018

Phases of penetration testing

1. Reconnaissance ; 2.Scanning  ; 3.Gaining Access ; 4.Maintaining the access ; 5. Covering Tracks & writing the reports. [view]

By: srdl | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

Internet worm maker thing LAB

*NOT FOUND ON INTERNET* Worms replicate on their own and they tend to attack windows services. Viruses attack the user that is logged on to the computer.Changing the date and time on the hacked computer allows us to screw with its clocks and log file [view]

By: | Related Lesson: Internet Worm Maker Thing Lab | Modified: April 1, 2018

Bintext LAB (2)

A program like internet worm maker basically rewrites the shells and changes registry entries, runs VB scripts and makes show cause to the windows operating system. [view]

By: | Related Lesson: bintext Lab 2 | Modified: April 1, 2018

« First ‹ Previous 1 13 103 111 112 113 114 115 123 213 3732 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?