Skip to content

Practical Ethical Hacking

by TheCyberMentor

Summary

The Ethical Hacker Methodology : The five stages of ethical hacking

  • First stage : Reconnaissance (information gathering) can be active or passive
  • Second stage : Scanning and Enumeration
  • Third stage : Exploitation (gaining access)
  • Fourth stage : Maintaining Access
  • Fifth stage : Covering Tracks

Tools

  • Passive Recon :
  • Scanning & Enumeration :
    • nmap
    • nikto
    • dirbuster / dirsearch
    • Masscan
    • Nessus
    • Metasploit
  • Exploitation :
    • Metasploit

Mindmap

First things first : nmap -T4 -A -v -p- $IP

Port 80

  • nikto $IP
  • curl -I $IP
  • Open browser
  • Burpsuite