Hunting Sub-Domains. Here we are going to look at web information gathering. It is very important 'cause, most times we'll be tasked with a web pen test or we encounter a site on an internal or external penetration test, being able to perform enumeration and gather information on those sites are super important. We'll see … Continue reading Information Gathering. (Part 2)
Category: Ethical Hacking and Pentesting
The Five Stages Of Hacking.
Before we start getting our hands dirty with the hacking, we need to know the five (5) stages of Ethical Hacking. This are the stages you'll go through on every assessment. NB: PLEASE EVERY INFORMATION LEARNED IN THIS COURSE, SHOULD ONLY BE USED FOR ETHICAL PURPOSES. DON'T ATTACK ANYONE WITHOUT EXPLICIT PERMISSION TO DO SO. … Continue reading The Five Stages Of Hacking.
Python. (Part 5)
Dictionaries. Before we begin, I just want to let you know that this is the last section on basics. The next post (Which will be on Friday), we will begin the first of the five stages of hacking (Reconnaissance). I don't know about you but I'm sure excited to dive into hacking and use all … Continue reading Python. (Part 5)
Python. (Part 4)
Looping. For Loops In the previous post we took a look at looping, in the Bash scripting section. We looked at one line for loops, which I'm hoping you went ahead to practice on your own and you are familiar with. We're going to be looking at that but in Python and also while loops, … Continue reading Python. (Part 4)
Scripting with Bash.
For this we would be writing a small ping sweeper script. Sending out a ping and getting information back that the ping was valid. To know which machine responds to the ping, we need to: Identify what a valid ping looks like.Use grep to extract specific line of information from the valid ping result.Use cut … Continue reading Scripting with Bash.