Practical Ethical Hacking
by TheCyberMentor
Summary
- 1 Networking Refresher
- 2 Introduction to Linux
- 3 Introduction to Python
- 4 Reconnaissance
- 5 Scanning & Enumeration
- 6 Exploitation Basics
- 7 Buffer Overflows
- 8 Active Directory
- 9 Post Exploitation
- 10 Web Application
- 11 Wireless Pentesting
- 12 Report Writing
The Ethical Hacker Methodology : The five stages of ethical hacking
- First stage : Reconnaissance (information gathering) can be active or passive
- Second stage : Scanning and Enumeration
- Third stage : Exploitation (gaining access)
- Fourth stage : Maintaining Access
- Fifth stage : Covering Tracks
Tools
- Passive Recon :
- Scanning & Enumeration :
- nmap
- nikto
- dirbuster / dirsearch
- Masscan
- Nessus
- Metasploit
- Exploitation :
- Metasploit
Mindmap
First things first : nmap -T4 -A -v -p- $IP
Port 80
nikto $IP
curl -I $IP
- Open browser
- Burpsuite