Home
Explore
Courses
Blog
Tutors
Contribute
Documentation
Donate
Source Code
Introduction to pentesting
: Ask the tutor
Ask the tutor
Please enable JavaScript to view the
comments powered by Disqus.
Contents
Intro
Introduction
Setting the stage
Introduction to BlackArch
The use and creation of a hacking Lab
Phases of a penetration test
Four steps methodology
Reconnaissance
Introduction
HTTRack
Google directives
The Harvester
Whois
Host
Extracting information from DNS
NSLookup
Dig
Extracting information from E-Mail servers
MetaGooFil
Social Engineering
Finding attackable targets
How do I practise this step
Where do I go from here?
Summary
Scanning
Introduction
Pings and Sweeps
The three way handshake
Performing port scans
Vulnerability scanning
How do I practise this step?
Where do I go from here?
Summary
Exploitation
Introduction
Gaining access to remote services with Medusa
Metasploit
Cracking passwords with John the Ripper
Password resetting
Sniffing network traffic
Macof
How do I practise this step?
Where do I go from here?
Summary
Web-Based Exploitation
Introduction
Nikto
Spidering websites with WebScarab
Intercepting requests with WebScarab
Code Injection Attacks
CROSS-SITE-SCRIPTING
How do I practise this step?
Where do I go from here?
Summary
Maintaining Access with Backdoors and Rootkits
Introduction
Netcat
Cryptcat
Rootkits
Detecting and defending against rootkits
How do I practise this step?
Where do I go from here?
Summary
Ask the tutor
Ask the tutor