Penetration Testing and Ethical Hacking Notes

Introduction to Footprinting

Footprinting is where we document all of the informations about a host. These informations can come from a varity of sources.  Some of the information will be about our target for example: Organisational Websites Directories Anything regarding emai [view]

By: phoenixits | Related Lesson: Introduction to Footprinting | Modified: June 15, 2016

nslookup Lab

nslookup- understand relationship name resolution between domain name and ip address authoritated- comes from name server non-authoritated- someone else’s name server nslookup then ’name’ e.g nslookup www.cybrary.it nslookup hit ent [view]

By: vivitenna | Related Lesson: nslookup Lab | Modified: June 15, 2016

Phases of penetration testing

Phase1 reconnaissanceThis can be done actively or passively by basicly meaning you can passively find information about your host either going through intermediary or you can actively indirectly reach out and touch your target.  Phase2 scanning [view]

By: phoenixits | Related Lesson: The Five Phases of Penetration Testing | Modified: June 15, 2016

Reconnaissance

Leo Dregier [view]

By: Himalia | Related Lesson: The Five Phases of Penetration Testing | Modified: June 15, 2016

Footprinting

The information! Phone,Network,Website,Email,Google,WHois,DNS,IP Blocks,Net Blocks,Web SVR Content,Source code,Website Mirroring,OS Detecting(C/s) [view]

By: sanjayybs | Related Lesson: Footprinting (Whiteboard) | Modified: June 15, 2016

Phases of Penetration Testing

1Reconnaissance 2Scanning 3Gaining access 4Maintaining the access 5Writing Reports [view]

By: sanjayybs | Related Lesson: The Five Phases of Penetration Testing | Modified: June 15, 2016

My First note test

this is a test héhé [view]

By: kzelda | Related Lesson: The Five Phases of Penetration Testing | Modified: June 15, 2016

AnyWho Lab

type name directly into google Google Hacking yasni [view]

By: vivitenna | Related Lesson: AnyWho Lab | Modified: June 15, 2016

web app

XSS exploits relship bet client and server CSRF req forgery cookie poison – stored code on browser client side [view]

By: cwen | Related Lesson: Web Applications (Whiteboard) | Modified: June 15, 2016

Footprinting

Foot printing: Target: Have firewalls- Preventive protection systems Inside of target: Find out internel DNS scheme Private Websites-directoes-portals Attack- Dumpster Diving-Shoulder Surfing EavesDropping External of target: Telephone- phone numbers [view]

By: vivitenna | Related Lesson: Footprinting (Whiteboard) | Modified: June 15, 2016

« First ‹ Previous 1 3623 3713 3721 3722 3723 3724 3725 3726 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel