Tuesday , September 25 2018
Home / Jahanzaib Khan (page 20)

Jahanzaib Khan

Jahanzaib Khan is Web Designer & Ethical Hacker. He Who has been working since 2014, and is managing several successful websites on the internet for about 3 years. Jahanzaib-khan.com

What is Enumeration?

What is Enumeration?

What is Enumeration: Enumeration is the process of extracting information from a target system to determine more of the configuration and environment present. In many cases it is possible to extract information such as usernames, machine names, shares, and services from a system as well as other information, depending on …

Read More »

Commonly Exploited Services

Commonly Exploited Services

Commonly Exploited Services: The Windows OS is popular with both users and attackers for various reasons, but for now let’s focus on attackers and what they exploit. Windows has long been known for running number services by default, each of which opens up a can of worms for a defender …

Read More »

Services and Ports of Interest

Services and Ports of Interest

Services and Ports of Interest: As we wade into the enumeration phase, let’s make sure you understand more details about ports. You should expect during your scanning phase to uncover a number of ports, some of which may be useful to you for enumeration and other less so. Here are …

Read More »

Location and Geography

Location and Geography

Location and Geography: Not to be overlooked or underestimated in value is any information pertaining to the physical location of offices and personnel. You should seek this information during the Footprinting process because it can yield other key details that you may find useful in later stages, including physical penetrations. …

Read More »

Terminology in Footprinting

Terminology in Footprinting

Terminology in Footprinting: In this section you will learn definitions that may appear on the CEH v10 (Certified Ethical Hacking) exam.   Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the least aggressive, basically, the process relies on obtaining …

Read More »

Secure Sockets Layer

Secure Sockets Layer

Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by Netscape in the mid-1990s and rapidly became a standard mechanism for exchanging data securely over insecure channels such as the Internet. NOTE: SSL is supported by all modern browsers and …

Read More »

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking to see where Footprinting fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject …

Read More »

Hacking: Current Developments

Hacking: Current Developments

Current Developments: In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In the first few years of the new millennium, the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following (although there are many …

Read More »