Category Archives: Ethical Hacking
Ethical Hacking Penetration Testing Final Project
Penetration testing target: pentest.id The basic penetration testing process was used for this project. There were 4 processes: Discovery/Reconnaissance, Scanning, Exploitation, and Post-Exploitation. (5 Important Questions to Ask Your Next Penetration Tester, 2015). The main purpose of this testing: Discover … Continue reading
Ethical Hacking Weekly Report
Week 1 This week was our first meeting. We were introduced to the course. We were also informed about the projects that need to be complete to pass this course. Week 2 This week, we learned about information gathering included … Continue reading
Ethical Hacking – Individual Assignment
The tool used – Sherlock Sherlock is a tool that can be used to find social media accounts across many varieties’ websites that may be related to the real target. Each social media may contain links to others that use … Continue reading
Attention!
All tools, guidance, and tutorials in this blog are for education only.