Index

KALI

  1. LINUX COMMANDS
  2. NETWORK COMMANDS
  3. PYTHON BASICS

STAGES

  1. RECONNAISSANCE
  2. SCANNING TOOLS
  3. ENUMERATION
    1. KIOPTRIX
      1. VULN
        1. Default_webpage(low)
        2. Server_header info desclosure(low)
        3. Default404_infodisclosure
        4. Weak Ciphers
        5. smb_findings
  4. EXPLOITATION

STAGES

Five stages of Ethical Hacking:
Reconnaissance : Passive : info gathering, Active :Attempting scans..
Scanning and Enumeration :nmap,nessus,nikto,metasploit
Gaining Access
Maintaining Access
Covering Tracks