Penetration Testing and Ethical Hacking Notes

Notes #1

Phases of Penetration #1 Recon #2 Scanning #3 Gaining Access #4 Maintaining Access #5 Covering Tracks   [view]

By: slothbear | Related Lesson: The Five Phases of Penetration Testing | Modified: June 16, 2016

??

in the beginning, it looks like he discovers the tool while presenting it… funny [view]

By: Pop3y3 | Related Lesson: Web Data Extractor Lab | Modified: June 16, 2016

footprining(whiteboard)

Theory Have a target(person or company) regardless, they have firewalls, try to prevent us from getting the info, We all want to get the big target, but first we use the little steps. to get the compiney of the person or the person of that comoenay  [view]

By: imperfect | Related Lesson: Footprinting (Whiteboard) | Modified: October 29, 2016

scaning

dnsenum [view]

By: synysters | Related Lesson: DNS Enumeration Lab | Modified: June 16, 2016

nslookup

nslookup [view]

By: manlam | Related Lesson: nslookup Lab | Modified: June 16, 2016

introduction(basics)

Some information is about the target, for example be our organizational websites, directories, anything regarding email..  Most available over the internet, job sites or anything realistically on the internet…  [view]

By: imperfect | Related Lesson: Introduction to Footprinting | Modified: June 16, 2016

phases

phase 1 reconnaissance, phase 2 scanning, phase 3 gaining access, phase 4 maintaining that access, and phase 5 is covering your tracks or writing your reports. [view]

By: imperfect | Related Lesson: The Five Phases of Penetration Testing | Modified: June 16, 2016

6- ping cmd

ping tool for windows ————————- open cmd then type ” ping /? ” for review and help  example—- *ping www.example.com *ping -a (IP adress of the target)     [view]

By: ashswatsonoo7 | Related Lesson: Ping Lab | Modified: June 16, 2016

5- path analyzer tool

download the path analyzer tool for windows and take a look… [view]

By: ashswatsonoo7 | Related Lesson: Path Analyzer Pro Lab | Modified: June 16, 2016

Pentest Phases

The five phases are: Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks. [view]

By: rileywilliams | Related Lesson: The Five Phases of Penetration Testing | Modified: June 16, 2016

« First ‹ Previous 1 3621 3711 3719 3720 3721 3722 3723 3731 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel