Thursday , 2 July 2020

Services and Ports of Interest

Services and Ports of Interest

Services and Ports of Interest: As we wade into the enumeration phase, let’s make sure you understand more details about ports. You should expect during your scanning phase to uncover a number of ports, some of which may be useful to you for enumeration and other less so. Here are several that you should pay close attention to: TCP 21—FTP: …

Read More »

Location and Geography

Location and Geography

Location and Geography: Not to be overlooked or underestimated in value is any information pertaining to the physical location of offices and personnel. You should seek this information during the Footprinting process because it can yield other key details that you may find useful in later stages, including physical penetrations. In addition, knowing a company’s physical location can aid in …

Read More »

Download Complete Python Bootcamp: Go From Zero To Hero in Python 3

Complete Python Bootcamp: Go From Zero To Hero in Python 3

COMPLETE PYTHON BOOTCAMP: Learn Python Now! Start from the very basics and go from creating your very own applications and games. Created By: Jose Portilla Last Updated: 3/2018 Best Selling / English Course   What Will You Learn: You will learn Python professionally, which includes python 2 and 3 versions. You will create games with Python, Tic Tac Toe and …

Read More »

Terminology in Footprinting

Terminology in Footprinting

Terminology in Footprinting: In this section you will learn definitions that may appear on the CEH v10 (Certified Ethical Hacking) exam.   Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the least aggressive, basically, the process relies on obtaining information from those sources that are typically publicly available and …

Read More »

Secure Sockets Layer

Secure Sockets Layer

Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by Netscape in the mid-1990s and rapidly became a standard mechanism for exchanging data securely over insecure channels such as the Internet. NOTE: SSL is supported by all modern browsers and email clients transparently. When a client connects to a location …

Read More »

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking

Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking to see where Footprinting fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject of this article. This phase consists of passively and actively …

Read More »

Hacking: Current Developments

Hacking: Current Developments

Current Developments: In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In the first few years of the new millennium, the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following (although there are many more): Denial-of-service attacks Manipulation of stock prices Identity theft Vandalism …

Read More »

So, What is an Ethical Hacker?

So, What is an Ethical Hacker?

What is an Ethical Hacker: When you explore this blog and the tools it has to offer, you are learning the skills of the hacker. But we can’t leave it at that, because you need to be an ethical hacker, so let’s explore what that means. Ethical hackers are employed either through contracts or direct employment to test the security …

Read More »

Reporting a Security Incident

Reporting a Security Incident

Reporting a Security Incident: Once an incident has been responded to and a team has gotten involved to assess the damage and start the cleanup, the required parties will need to be informed. These parties be will responsible for getting the ball rolling whether it is legal action, an investigative process, or other requirements as necessary. When considering how to …

Read More »

Competitive Analysis

Competitive Analysis

Competitive Analysis: We have covered some great tools so far, but there is another way of gathering useful data that may not seem as obvious; Competitive Analysis. The report created through competitive analysis provides information such as product information, project data, financial status, and in some cases intellectual property. Good places to obtain competitive information are the following: EDGAR (the …

Read More »