hacking

Basic Hacker Methodology – Steps to the Hacking Process

Overview

Many beginners don't understand that hacking or penetration testing follows a very logical process and when broken down can really clarify tasks and goals. During this write-up I will use a fake company as an example and use very general examples of how each step is completed. Our target will be a fake company called SillyVictim and all we know is that they have a webpage and they have an internal company network. Our goal is infiltrate this company and obtain admin privileges. I'll be using my metasploitable and Kali VM's from my previous lesson as examples on how to apply this methodology. (more…)

By hellor00t, ago

Hackmethod is proud to announce Mal_Wear by HM. Exploit/Vulnerability themed nerdy t-shirts! Get them while they last. Dismiss