Penetration Testing and Ethical Hacking Notes

Phases of Penetration

Phase 1: Recognizance (Active & Passive) Phase 2: Scanning Phase 3: Gaining Access Phase 4: Maintaining Access Phase 5: Covering tracks (repeat) [view]

By: rhageboeck | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

vid 1

phase 1 : reconnaissance phase 2: scanning phase 3: gaining access phase 4: maitaining access phase 5: maintaining reports [view]

By: imraanahamed29 | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

third note

Back Ground of foot printing setting the target . INTERNAL: internal dns private websites dumpster diving(attack) shoulder surfing( right at the reception ) eaves dropping(any center to have access) EXTERNAL: Phone network website Email Header *GOOGL [view]

By: negi19917 | Related Lesson: Footprinting (Whiteboard) | Modified: April 1, 2018

second note

 foot printing: in the world of penetration tests it is one of the major role . eg: organisational websites threats: could be used in social engineering acts tools and technqiues:   [view]

By: negi19917 | Related Lesson: Introduction to Footprinting | Modified: April 1, 2018

fport LAB

*Is compatible with windows XP, 2000 and NT only. **Use netstat -anob in CMD (administrator mode) to see PIDs, protocols, names, connection status,etc. of executables. Type where ”filename” to find an executable’s position (works on [view]

By: | Related Lesson: fport Lab | Modified: April 2, 2018

Introduction to trojans

We create trojans with the concept of troy.Here, we have an overt and covert application.Overtly, we put an application or some distraction in front of the end user and covertly we drop a backdoor to get access to the end user system.Trojans require [view]

By: | Related Lesson: Introduction to Trojans | Modified: April 1, 2018

Phases of penetration testing

1. Reconnaissance ; 2.Scanning  ; 3.Gaining Access ; 4.Maintaining the access ; 5. Covering Tracks & writing the reports. [view]

By: srdl | Related Lesson: The Five Phases of Penetration Testing | Modified: April 1, 2018

Internet worm maker thing LAB

*NOT FOUND ON INTERNET* Worms replicate on their own and they tend to attack windows services. Viruses attack the user that is logged on to the computer.Changing the date and time on the hacked computer allows us to screw with its clocks and log file [view]

By: | Related Lesson: Internet Worm Maker Thing Lab | Modified: April 1, 2018

Bintext LAB (2)

A program like internet worm maker basically rewrites the shells and changes registry entries, runs VB scripts and makes show cause to the windows operating system. [view]

By: | Related Lesson: bintext Lab 2 | Modified: April 1, 2018

notitl

soa start of authority. a host records mx mail records ns name server for authoratitive answer specify [view]

By: Nepolian Pratik | Related Lesson: nslookup Lab | Modified: April 2, 2018

« First ‹ Previous 1 13 103 111 112 113 114 115 123 213 3731 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel