hacking

Basic Hacker Methodology – Steps to the Hacking Process

Overview

Many beginners don't understand that hacking or penetration testing follows a very logical process and when broken down can really clarify tasks and goals. During this write-up I will use a fake company as an example and use very general examples of how each step is completed. Our target will be a fake company called SillyVictim and all we know is that they have a webpage and they have an internal company network. Our goal is infiltrate this company and obtain admin privileges. I'll be using my metasploitable and Kali VM's from my previous lesson as examples on how to apply this methodology. (more…)

By hellor00t, ago
Categories
Disclaimer

This website is made available for educational purposes only as well as to give you general information on the topics of cyber security. By using the services and information provided on this site you release all liability or claims made to Hackmethod LLC or the authors of this content. Furthermore you agree to not use this content for any illegal purpose.

Copyright 2018 Hackmethod LLC. All Rights Reserved.