Hi there. Welcome to the Python and Ethical Hacking section, where we’ll be building our own tools using Python. Posts on Python + Ethical Hacking, will be uploaded from Friday, 4th of September, 2020. The schedule will be the same as the Ethical Hacking & Pentesting category. Which is, Mondays, Wednesdays and Fridays. This will … Continue reading Announcement —Python & EH.
Author: Phoenix
Information Gathering. (Part 2)
Hunting Sub-Domains. Here we are going to look at web information gathering. It is very important 'cause, most times we'll be tasked with a web pen test or we encounter a site on an internal or external penetration test, being able to perform enumeration and gather information on those sites are super important. We'll see … Continue reading Information Gathering. (Part 2)
The Five Stages Of Hacking.
Before we start getting our hands dirty with the hacking, we need to know the five (5) stages of Ethical Hacking. This are the stages you'll go through on every assessment. NB: PLEASE EVERY INFORMATION LEARNED IN THIS COURSE, SHOULD ONLY BE USED FOR ETHICAL PURPOSES. DON'T ATTACK ANYONE WITHOUT EXPLICIT PERMISSION TO DO SO. … Continue reading The Five Stages Of Hacking.
Python. (Part 5)
Dictionaries. Before we begin, I just want to let you know that this is the last section on basics. The next post (Which will be on Friday), we will begin the first of the five stages of hacking (Reconnaissance). I don't know about you but I'm sure excited to dive into hacking and use all … Continue reading Python. (Part 5)
Python. (Part 4)
Looping. For Loops In the previous post we took a look at looping, in the Bash scripting section. We looked at one line for loops, which I'm hoping you went ahead to practice on your own and you are familiar with. We're going to be looking at that but in Python and also while loops, … Continue reading Python. (Part 4)