Penetration Testing and Ethical Hacking Notes

1.Penetration Testing

Passively find info Scanning/Find more info about the host. Scan ports find detail Gain access/Perform hack or exploit Cover your tracks RINSE AND REPEAT [view]

By: suffy | Related Lesson: The Five Phases of Penetration Testing | Modified: March 30, 2018

Footprinting Theory

 Firewall/Intrusion Detection System are the protection Document anything and everything Internally: Find Internal DNS/active directory See if there are any Private Websites Dumpster Diving-digging through their trash literally Shoulder Surfing-watc [view]

By: V!p3r | Related Lesson: Footprinting (Whiteboard) | Modified: March 30, 2018

footprinting

 ip address  email tools and techniques documentation have a target public information [view]

By: traphouse | Related Lesson: Introduction to Footprinting | Modified: March 30, 2018

phases of penetration testing

 reconnaissance scanning gaining access maintain access covering our hacks       [view]

By: traphouse | Related Lesson: The Five Phases of Penetration Testing | Modified: March 30, 2018

steps

1 2 info 3 access 4 maintain 5 cover tracks [view]

By: equivilent | Related Lesson: The Five Phases of Penetration Testing | Modified: March 30, 2018

footprinting in recon

nslookup tool.. open up cmd and type nslookup set type=x set type=a set type=MX set type=SOA server 8.8.8.8- google server >> appending to txt   [view]

By: 123monster123 | Related Lesson: nslookup Lab | Modified: March 30, 2018

Phases of PenTesting

1) recon active/passive 2) scanning – find even more info  3) gaining access 4) maintain access 5) covering tracks   [view]

By: jiggle69 | Related Lesson: The Five Phases of Penetration Testing | Modified: March 30, 2018

basics of hacking

1. google.com- poke around (does not help though) (google hacking: filetypes;pdf, name of target then spokeo, name of target then yasni [most effective], ) 2.  use anywho.com (helps abit)     [view]

By: 123monster123 | Related Lesson: AnyWho Lab | Modified: March 30, 2018

penetrating cycle

1 reconnaisance  2 scanning 3 gaining acces  4 maintaining access 5 covering tracks  [view]

By: 9arouu7 | Related Lesson: The Five Phases of Penetration Testing | Modified: March 30, 2018

theory of footprinting

 we need a target- the has intrusion protection like firewalls and internal defense systems internally we can find the internal dns, private websites (including employer info)…then we can attack- Dumpster diving (getting the information we nee [view]

By: 123monster123 | Related Lesson: Footprinting (Whiteboard) | Modified: March 30, 2018

« First ‹ Previous 1 21 111 119 120 121 122 123 131 221 3732 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel