Skip to main content

Posts

Blueprinting The Target Part - 3

Information Gathering Introduction      Welcome to module 3 of the workshop. We have been talking about the 90/10 principle and we learned that 90 percent of the ethical hacking or penetration testing work around goes into gathering the information of the target network. We have also covered the activities usually performed in the information-gathering phase. In this module, we do hands-on in our virtual hacking lab we have justbuilt in our previous module. Prerequisite   It is strongly recommended to newcomers that they should first complete the previous modules and clear the concepts. Follow the steps to build the virtual hacking lab we have been explaining in previous two modules. Quick walkthrough    In the information gathering phase, you collect as much as information about the target network as you can. The information gathering phase is comprised of four (4) activities listed below. • Identify live hosts • Discover...

Blueprinting The Target Part - 2

Understanding the methods for hacking Network Nodes  Introduction       In this module, we will cover the overall hacking methodology in order to attack network nodes. We spoke about the 90/10 principle in our previous module; in this module we will elaborate in granular detail to explain the concept of this principle. Prerequisites     To get the most out of this workshop, it is recommended that you should first complete the previous module before making an effort to go through this module. You must have the understanding of the terminologies explained in the previous module and have the virtual hacking lab up and running. Therefore, it is strongly recommended that you complete the previous module. 90/10 Principle    In general, this principle doesn’t reinvent the wheel, however, it highlights the core requirements of all types of ethical hacking and penetration testing. All types of ethical hacking / penetrati...

Blueprinting The Target Part - 1

Basics of  Hacking Hacking is famous and is among the most searched words on search engines. It’s always been an interesting topic for school students. Hacking is an extra mile from the normal information technology field. You need to know many things if you want to peruse your career in the field of ethical hacking or security testing. Prerequisites • Knowledge of TCP/IP protocols • Basic knowledge of Metasploit framework • Prior hands-on experience with Virtual Machines • Understand general concepts of networking technologies • Experienced in any one operating system [Linux, Windows & OSX] • Understands the basics of hacking terminologies, e.g. exploit, payload, vulnerability • Prior experience with any network based security scanners What we will cover As we have just mentioned, learning hacking requires you to know many things, however, we will present for you in a nutshell how to perform ethical hacking but our workshop is limited to focusing o...