Monthly Archives: March 2018

Ethical hacking week 4

Target Discovery To attack, we need a target, hence the target discovery. When a website server IP is protected, they may share the same IP with the other websites that may have vulnerabilities. if your real target is directly secured, … Continue reading

Posted in Uncategorized | Comments Off on Ethical hacking week 4

Ethical Hacking Week 3

DNS: what dns do? resolve host names to ip address simple but extremely vunerable because using simple protocol (using UDP) DNS is mapping machine DNS zone transfer: – enables you to see all hosts on a network – GIves you … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Week 3

Ethical Hacking Week 1 & 2

Week 1: Ethical hackers: people that have hacking skills employed by a company to perform penetration tests Penetration test (pentest): legally attempt to break in a company’s network through it’s weakness, testers only to report their findings Security test: includes … Continue reading

Posted in Uncategorized | Comments Off on Ethical Hacking Week 1 & 2