Penetration Testing and Ethical Hacking Notes

change info -recmmender

reecommender halp [view]

By: henry7no | Related Lesson: nslookup Lab | Modified: March 18, 2018

SuperScan tool

A great, easy scanning tool. Output will show you TCP and UDP ports. Check what the prts mean if you don’t remember. Copy this information for report. While scanning you can also use wireshark to see if there’s ”Man in the middle [view]

By: desudesudesu3 | Related Lesson: SuperScan Lab | Modified: March 18, 2018

information of the tharget

name of the tharget spokeo name of the tharget yasni   [view]

By: henry7no | Related Lesson: AnyWho Lab | Modified: March 18, 2018

footprinting(whiteboard)

A Building as target and we find out: Internal dns scheme,private websites,dumpster diving,shoulder surfing-document what you see as you enter the building,eaves dropping-corporate center, where they mostly gather External phone,network,website,email [view]

By: Bofelo | Related Lesson: Footprinting (Whiteboard) | Modified: March 18, 2018

ONE LESSON

INTRODUCTION [view]

By: KESSAS TAWFIQ | Related Lesson: The Five Phases of Penetration Testing | Modified: March 18, 2018

DNS Reconnaissance

Ex: 1 >ping www.xyz.org 2 >nslookup www.xyz.org 3 >nslookup >www.xyz.org >set type=mx >www.xyz.org 4 >set type=SOA   >www.xyz.org 5 >set type=NS >www.xyz.org 6 >ls -d www.xyz.org        [view]

By: candelas | Related Lesson: DNS Overview and Zone Transfers | Modified: March 18, 2018

process programs in windows

dir c://windows/system32/ps*.exe [view]

By: caus | Related Lesson: PsTools Lab | Modified: March 18, 2018

foot 2

internal dns private web dumpster diving shoulder surfing eaves dropping 1000k external method   [view]

By: jackhelen | Related Lesson: Footprinting (Whiteboard) | Modified: March 18, 2018

5 phases

reconnaiscene   scanning  getting acces maintenace acces report  [view]

By: AMINE EDDER | Related Lesson: The Five Phases of Penetration Testing | Modified: March 18, 2018

The five phases of Penetration

1.recon 2.scanning 3.gaining access 4.maintain 5.covering over tracks   [view]

By: Bofelo | Related Lesson: The Five Phases of Penetration Testing | Modified: March 18, 2018

« First ‹ Previous 1 112 202 210 211 212 213 214 222 312 3732 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel