Wednesday, January 19, 2022
Home Hacking and Infosec Ethical Hacking

Ethical Hacking


Learn basic concepts of Ethical Hacking/Penetration Testing and Information Security.

In this category, you’ll find all the basic information you need to get started with Ethical Hacking or Penetration Testing. You can do further research on these topics and learn the art of Penetration testing. Our series is divided into 2 parts. The first part is completely for beginners. Where we’ll discuss the basic ways to gain access over a targeted victim. We’ll discuss techniques like phishing, social engineering and others used to scam/trick a victim. The second phase/part will include the proper concept of penetration testing including vulnerability assessment, exploitation, reverse engineering, and other stuff.

Here is the overview of our series:

Basic Concepts of Ethical Hacking:

Part #1

Access through stealing Login credentials.

  1. Login and Access
  2. Authorized and Unauthorized Access
  3. How passwords are stored
  4. Gaining Unauthorized access
    1. Information Gathering
    2. Some common techniques
      1. Phishing
      2. Social Engineering
      3. Password stealing

Part #2

Access through Vulnerabilities:

  1. Concept of Vulnerability
    1. Understanding vulnerabilities
  2. Vulnerability assessment and Exploitation
    1. Vulnerability Assessment
    2. Exploitation
      1. Attacks
      2. Exploit Development
  3. Trojans
  4. Reverse Engineering