Penetration Testing and Ethical Hacking Notes

anywho

get every piece of info about the victim [view]

By: ivantech | Related Lesson: AnyWho Lab | Modified: March 17, 2018

nslookup Lab

Footprinting and reconnaissance -nslookup –varies from system to system -authoritative answer –comes from the name server we specified -non-authoritative answer –comes from someone else’s name server -nslookup –one of fe [view]

By: | Related Lesson: nslookup Lab | Modified: March 21, 2018

fases

1 reconisense active non active [view]

By: godfella777 | Related Lesson: The Five Phases of Penetration Testing | Modified: March 17, 2018

Introduction

5 phases [view]

By: faati | Related Lesson: The Five Phases of Penetration Testing | Modified: March 17, 2018

AnyWho Lab

1 Uses simple sources for recon -anywho -spokeo -yasni [view]

By: | Related Lesson: AnyWho Lab | Modified: March 17, 2018

Footprinting

***Document Everything*** 1 Internal Footprinting -Internal DNS -Private websites -Dumpster diving (physical access) -Shoulder surfing -Eavesdropping 2 External Footprinting -Phones -Networks -Websites -Information that goes into the company -Google [view]

By: | Related Lesson: Footprinting (Whiteboard) | Modified: March 17, 2018

5 phases of pen testing

5 phases of pen testing 1 reconnaissance -intermediary -direct contact 2 scanning -port and vulnerability scanning 3 gain access and perform hack 4 maintain access 5 cover tracks [view]

By: | Related Lesson: The Five Phases of Penetration Testing | Modified: March 17, 2018

time

3.14 [view]

By: amine ait el amiri | Related Lesson: Path Analyzer Pro Lab | Modified: March 17, 2018

note 1

penetration:اختراق reconnaissance:استطلاع either:إما reach out;تواصل disclosure:كشف vulnerability:حساسية perform:أدى maintain:الحفاظ process:معالجة injection:حقنة dig in:تنقيب عن الآثار co [view]

By: zouhaircharef | Related Lesson: The Five Phases of Penetration Testing | Modified: March 17, 2018

NSLookUp Lab

Type in URL’s to look up info such as IP addresses.  Document NSLookUp results on your target.  Results depend on if external or internal domain server. Internal is more usable information.  Record 8.8.8.8 results (Google server).  Record b [view]

By: BDeMeo | Related Lesson: nslookup Lab | Modified: March 17, 2018

« First ‹ Previous 1 115 205 213 214 215 216 217 225 315 3732 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel