Advanced Penetration Testing - Part 1 (Introduction)

Oct 22, 2015 01:10 AM

Hello! My name is An0nex. I am an ethical hacker who wants to share the art of hacking with all of you guys!

Reconnaissance is a big part in the hacking community.

Penetration testing is most effective when you have a good grasp on the environment being tested. If you're an ethical hacker, penetration testing as a job, e.g. A company hired you to hack them and make a full summary on it, you will usually be given the average information. You will already have a map of the website down. But, sometimes, you need to get the information yourself, which is sometimes tricky.

In this chapter, I will be showing you how-to perform Advanced Reconnaissance Techniques.

In this chapter or however it is called here, our KEY TOPICS include:

1.) What is reconnaissance and why do we need it

2.) Reconnaissance types

3.) Using DNS to quickly identify potential targets

4.) Using search engines data

5.) Using metadata to your advantage

The types of reconnaissance we will be focused on our OSINT (Open Source Intellegence) and footprinting. If you're wondering... OSINT consists of gathering, processing, and analyzing publically available data and turning it into information that is actionable.

Important: This is a 'chapter' in reconnaissance but after sometime viewing at @Occupythewebotw 's page, I see he has made posts on reconnaissance already. Before I make another tutorial on this, please tell me above what you would rather like to be shown.

1.) Reconnaissance

2.) Remote Exploitation

3.) Web Application Exploitation

4.) Client-Side attacks

5.) Bypassing Firewalls, Avoiding Detection

Please tell me what you would rather like below! If no comments are made by tomorrow 6PM (My time), I'll just keep on with reconnaissance.

Thank you.

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!