Forum Thread: What After the Recon ?

Ok! I did the nmap reconnaissance of my intended target and found a couple of TCP and UDP ports open. But how to proceed thereafter ?

3 Responses

Here is a list from OTW about every process of a hacking attack. Basically you have to exploit the system with the vulnerabilities you discovered during the recon. The aforementioned post explains the entire process very good (and teaches you how to properly recon and understand the vulnerabilities you found).

Hope this helped.

Thanks man !!
It certainly did help...
I have been on this site for some time, but never saw that tutorial.
Just got stuck with some WPA cracking and all that stuff...

Glad I could help, if you open the how-to tab, you can find a very organized list of anything interesting you can find here.

Share Your Thoughts

  • Hot
  • Active