Penetration Testing and Ethical Hacking Notes

Tini Lab

Trojan present in the port 7777 telnet <ip address>  [view]

By: arpetamohanty | Related Lesson: Tini Lab | Modified: March 5, 2018

TcpView Lab

Process, process id, ports,path  [view]

By: arpetamohanty | Related Lesson: TcpView Lab | Modified: March 5, 2018

Penetration Testing

Reconnaissance Scanning Gaining access Maintaining access Covering tracks [view]

By: Thaze | Related Lesson: The Five Phases of Penetration Testing | Modified: March 5, 2018

PrcView Lab

Process viewer: Name of the process, ID, Priority, Path Not effective [view]

By: arpetamohanty | Related Lesson: PrcView Lab | Modified: March 5, 2018

Trojan whiteboard

components of a Trojan  Overt(things to distract the user with) -games  -Distracted Software  Covert(What will the hacker use and do) -backdoors -rootkits -keyloggers  -spyware (Note use wrapping software to combine the two) Types of Trojans -VN [view]

By: Samer | Related Lesson: Trojans (Whiteboard) | Modified: March 5, 2018

Foot printing white board

Target –  A company or person or website  Inside the target we can do   these types of attacks   1) Internal DNS 2) Private websites 3) Dumpster Diving 4) Shoulder surfing 5) Eaves Dropping.   [view]

By: manoharrajuv | Related Lesson: Footprinting (Whiteboard) | Modified: March 5, 2018

NSlookup

Nslookup tool   [view]

By: saad129 | Related Lesson: nslookup Lab | Modified: March 5, 2018

Phases of penetration testing

The different phases of Pen-testing: 1- Reconaissance 2-Scanning 3-Gaining Access 4-Maintaining Access 5-Identity concealment    [view]

By: sdm999 | Related Lesson: The Five Phases of Penetration Testing | Modified: March 4, 2018

Footprinting

Target (internal) Find our internal DNS find our if there are private websites Dumpster diving (if physical access) Shoulder surfing Eavesdropping Target (external) Telephone (call and social engin) Network (type) Public websites Email header (how [view]

By: arkad777 | Related Lesson: Footprinting (Whiteboard) | Modified: March 4, 2018

Module 1 - Phases of PenTesting

Different phases of PenTesting Phase 1: Reconaisance (active or passive) Phase 2: Scanning Phase 3: Gaining access Phase 4: Maintain access Phase 5: Covering Tracks   [view]

By: arkad777 | Related Lesson: The Five Phases of Penetration Testing | Modified: March 4, 2018

« First ‹ Previous 1 214 304 312 313 314 315 316 324 414 3732 Next › Last »

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel