Week 2

On our second session on ethical hacking and penetration testing, our main topic was about target scoping and information gathering. We were also asked whether we have installed our Kali Linux yet. We were also taught a lot about target scoping which is the correct procedure after we sign on the non-disclosure agreement and before we perform penetration testing. Target scoping involves the client too so that it made sure that the penetration testing is safe for both parties. We were taught the steps to perform information gathering, what could it cause, and what are the tools we could use for our information gathering process. At the end of the class, we were given a lab assignment about information gathering. We were assigned to sniff on another Kali Linux (or virtual machine) that we were supposed to make, and show the results on what we can sniff. There are several tools we used, and there are some steps that we would need to follow for it to be sniffed. The results are in a pcap file which can be accessed through Wireshark.

Category: Uncategorized
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>