Taking Notes

Use notekeeping tools to write key information down for later referral. Write down the actual commands and take screenshots!

Weiter lesen...

An Overview of Passive Recon(naissance)

Passive reconnaissance means gathering information that is already available on the internet, whereas active scanning begins with scanning of hosts.

Weiter lesen...

Identifying Our Target

To find a client that we can attack (legally) to practice reconnaissance, we use the public bugbounty program bugcrowd.com.

Weiter lesen...

Discovering Email Adresses

In this part, it will be demonstrated how one can find and verify email addresses as a part of reconnaissance on a target.

Weiter lesen...

Introduction to Python

This is part of the “Introduction to Python” module of TCM Sec’s “Practical Ethical Hacking” course. I have left out most of the material, which covers a basic introduction to Python. The rest is an application of Python for network programming.

Weiter lesen...

The Five Stages of Ethical Hacking

The five stages of ethical hacking are the same, irrespective if you hack into a network or a website:

Weiter lesen...

Scripting with Bash

This post is based on TCM Sec’s “Practical Ethical Hacking” course. It is the last topic in the “Introduction to Linux” chapter.

Weiter lesen...

Introduction to Linux

The following notes are based on TCM Security’s ‘Practical Ethical Hacking’. They refer to the Kali Linux operating system.

Weiter lesen...

Networking Refresher

The following notes are based on TCM Security’s ‘Practical Ethical Hacking’. They provide a short refresher of the most important concepts of networks.

Weiter lesen...

picoCTF: RPS

Another challenge from picoCTF 2022, worth 200 points.

Weiter lesen...