Networking Primer

IP Addresses

MAC Addresses

Hacking Methodology

Five Stages of Hacking 1. Reconnaissance (Informatino Gathering)

  1. Scanning and Enumeration
  2. Exploitation (gaining access)
  3. Maintaining Access
  4. Covering Tracks

Reconnaissance (Informatino Gathering)

Passive Recon


Target Validation(whois, nslookup, dnsrecon)

Finding Subdomains(Google Fu, dig, nmap, sublist3r, bluto)

Fingerprinting(Nmap, Wapp)

Data Breaches(HaveIBeenPawned) - most popular way to gain access (nowadays pretty hard to scan and find and exploit)

Scanning and Enumeration

Exploitation (gaining access)

Maintaining Access

Covering Tracks

Previous PostPost with a slider and lightbox
Next PostPost with YouTube Video
Comments (2)
John Doe
Posted at 15:32h, 06 December Reply

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

John Doe
Posted at 15:32h, 06 December Reply

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal

John Doe
Posted at 15:32h, 06 December Reply

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable. If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything embarrassing hidden in the middle of text.

John Doe
Posted at 15:32h, 06 December Reply

The standard chunk of Lorem Ipsum used since the 1500s is reproduced below for those interested. Sections 1.10.32 and 1.10.33 from "de Finibus Bonorum et Malorum" by Cicero are also reproduced in their exact original form, accompanied by English versions from the 1914 translation by H. Rackham.

Leave a Comment