Krissie's Blog

February 26th, 2021

Week 2: Target scoping

Posted by 2101716773krishita in Ethical Hacking & Penetration Testing

On the second week we learnt about target scoping as well as information gathering,

Target scoping refers to an empirical process for gathering target assessment requirements and characterizing each of its parameters to generate a test plan, limitations, business objectives, and time schedule.

An example of target scoping would consist of :

-Company Name
-Address
-Website
-E-mails and Phone Numbers
-Penetration Testing Objectives and Penetration Testing Type
-Operating Systems Supported

February 19th, 2021

Ethical Hacking week 1: Introduction to ethical hacking & penetration testing

Posted by 2101716773krishita in Ethical Hacking & Penetration Testing

In the first ethical hacking class, we were introduced to the 4 different types of hackers:

  1. Ethical hacker : Hackers hired by a company/cooperation to perform penetration testing and finding the weakness of a companies website.
  2. Hackers: People that access others computers, personal data without consent or permission.
  3. Crackers: breaks or violates the system or a computer remotely with bad intentions to harm the data and steal it. Crackers destroy data by gaining an unauthorized access to the network
  4. Script kiddies: have at their disposal a large number of effective, easily downloadable programs capable of breaching computers and networks

  • Monthly

  • Meta

    • Subscribe to RSS feed
    • The latest comments to all posts in RSS
    • Subscribe to Atom feed
    • Powered by WordPress; state-of-the-art semantic personal publishing platform.
    • Firefox - Rediscover the web