Jun 17

This week we learned to utilize tools in Kali Linux to gather more information on the target that you are trying to expose. For example a tool in Kali Linux called the Harvester can be used in order to gain such valuable information on your target.

Image result for the harvester tool

In the picture above you can see the Harvester command for searching “cvcc.edu” with the length of 8 from search engine google.

Example Command for the Harvester :  theHarvester.py -d targetdomain -l 100 -b google

The harvester is a very powerful tool that can be used for free in Kali Linux. Can be used to gain information from various search engines such as google, bing, yahoo, linkedIn, or twitter.

Jun 17

In the second week we learned about Target Scoping and Information Gathering.

Steps to target scope include :

  • Gathering Client Requirements
  • Preparing Test Plan
  • Profiling Test Boundaries
  • Defining Business Objectives
  • Project Management & Scheduling

We also discussed Penetration testing types

  1. White Box Model
  2. Black Box Model
  3. Informed Testing
  4. Social engineering

Also discusses some web tools that can be used in order to gather information.

Some examples are :

Whois : Gives a series of information shown below

page21image39341520
This tool is powerful in gathering of information and can give the attacker valued information of the victim that they are trying to penetrate. This is one of many tools that are available to use for hackers in order to gain information.

 

Jun 17

In the first week of Ethical Hacking course, we briefly discussed the basics of what hacking is and the cyber laws regarding to hacking. We learned the certificates that are needed in order to be a qualified and ethical hacker. Here is a basic introduction to what we learned on the first meet :

  • Ethical hackers
    • Employed by companies to perform penetration tests
  • Penetration test
    • Legal attempt to break into a company’s network to find its weakest link
    • Tester only reports findings
  •  Security test
    • More than an attempt to break in; also includes analyzing company’s securitypolicy and procedures
    • Tester offers solutions to secure or protect the network

The Instructor Sir Kalpin told his about his career and how his job requires the skills of an Ethical Hacker. He seemed very intellectual and observant regarding to the class that he is teaching. I am looking forward to continue to learn more about ethical hacking in this course.