Scanning & Enumeration. (Part 1)

Installing Kioptrix Level 1. Hey guys. Welcome to the scanning and enumeration section of this course flow. To begin, we're going to install a vulnerable virtual machine, called Kioptrix. Load up your web browser, in your host machine, and search for kioptrix level 1. This is what you should look for: Vulnhub is a great … Continue reading Scanning & Enumeration. (Part 1)

Announcement —Python & EH.

Hi there. Welcome to the Python and Ethical Hacking section, where we’ll be building our own tools using Python. Posts on Python + Ethical Hacking, will be uploaded from Friday, 4th of September, 2020. The schedule will be the same as the Ethical Hacking & Pentesting category. Which is, Mondays, Wednesdays and Fridays. This will … Continue reading Announcement —Python & EH.

Information Gathering. (Part 2)

Hunting Sub-Domains. Here we are going to look at web information gathering. It is very important 'cause, most times we'll be tasked with a web pen test or we encounter a site on an internal or external penetration test, being able to perform enumeration and gather information on those sites are super important. We'll see … Continue reading Information Gathering. (Part 2)

The Five Stages Of Hacking.

Before we start getting our hands dirty with the hacking, we need to know the five (5) stages of Ethical Hacking. This are the stages you'll go through on every assessment. NB: PLEASE EVERY INFORMATION LEARNED IN THIS COURSE, SHOULD ONLY BE USED FOR ETHICAL PURPOSES. DON'T ATTACK ANYONE WITHOUT EXPLICIT PERMISSION TO DO SO. … Continue reading The Five Stages Of Hacking.

Python. (Part 4)

Looping. For Loops In the previous post we took a look at looping, in the Bash scripting section. We looked at one line for loops, which I'm hoping you went ahead to practice on your own and you are familiar with. We're going to be looking at that but in Python and also while loops, … Continue reading Python. (Part 4)