Sunday , January 20 2019

April, 2018

  • 16 April

    What is Enumeration?

    What is Enumeration?

    What is Enumeration: Enumeration is the process of extracting information from a target system to determine more of the configuration and environment present. In many cases it is possible to extract information such as usernames, machine names, shares, and services from a system as well as other information, depending on …

  • 14 April

    Commonly Exploited Services

    Commonly Exploited Services

    Commonly Exploited Services: The Windows OS is popular with both users and attackers for various reasons, but for now let’s focus on attackers and what they exploit. Windows has long been known for running number services by default, each of which opens up a can of worms for a defender …

  • 13 April

    Services and Ports of Interest

    Services and Ports of Interest

    Services and Ports of Interest: As we wade into the enumeration phase, let’s make sure you understand more details about ports. You should expect during your scanning phase to uncover a number of ports, some of which may be useful to you for enumeration and other less so. Here are …

  • 12 April

    Location and Geography

    Location and Geography

    Location and Geography: Not to be overlooked or underestimated in value is any information pertaining to the physical location of offices and personnel. You should seek this information during the Footprinting process because it can yield other key details that you may find useful in later stages, including physical penetrations. …

  • 11 April

    Download Complete Python Bootcamp: Go From Zero To Hero in Python 3

    Complete Python Bootcamp: Go From Zero To Hero in Python 3

    COMPLETE PYTHON BOOTCAMP: Learn Python Now! Start from the very basics and go from creating your very own applications and games. Created By: Jose Portilla Last Updated: 3/2018 Best Selling / English Course   What Will You Learn: You will learn Python professionally, which includes python 2 and 3 versions. …

  • 10 April

    Terminology in Footprinting

    Terminology in Footprinting

    Terminology in Footprinting: In this section you will learn definitions that may appear on the CEH v10 (Certified Ethical Hacking) exam.   Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the least aggressive, basically, the process relies on obtaining …

  • 9 April

    Secure Sockets Layer

    Secure Sockets Layer

    Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by Netscape in the mid-1990s and rapidly became a standard mechanism for exchanging data securely over insecure channels such as the Internet. NOTE: SSL is supported by all modern browsers and …

  • 8 April

    Understanding the Steps of Ethical Hacking

    Understanding the Steps of Ethical Hacking

    Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking to see where Footprinting fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject …

  • 7 April

    Hacking: Current Developments

    Hacking: Current Developments

    Current Developments: In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In the first few years of the new millennium, the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following (although there are many …

  • 6 April

    So, What is an Ethical Hacker?

    So, What is an Ethical Hacker?

    What is an Ethical Hacker: When you explore this blog and the tools it has to offer, you are learning the skills of the hacker. But we can’t leave it at that, because you need to be an ethical hacker, so let’s explore what that means. Ethical hackers are employed …