5 PHASES of HACKING you must know.

preview_player
Показать описание
-- Description
Hello everyone, This video is a valuable resources for those who wants to make their career in Penetration Testing as well as Ethical Hacking. In this video, we cover the phases of penetration testing as well as ethical Hacking. Ethical hacking or Penetration Testing has Five Phases. Our first Phase is Reconnaissance. As you can Determine from the name, the purpose of this phase is to gather as much information of our target as we can. Phase 2 is Scanning. In this phase, we scan our target to check whether it has open ports that has some vulnerabilities, moreover we also check for firewalls etc. Next Phase is exploitation, Personally, This phase is my favourite, because in this phase we exploit weakness in the system and gain access. Phase 4 is Persistence, in this phase we upload some more backdoor to the target system, to make it persistent for later attacks. Last Phase is "Clearing Tracks", In this phase, we basically remove all the tracks for our existence on the targeted computer.
-------

-- Socials
------

-- TimeStamps
00:00 - 00:35 Introduction
00:36 - 01:14 Phase #1: Reconnaissance
01:15 - 01:54 Phase #2: Scanning & Enumeration
01:55 - 02:35 Phase #3: Exploitation
02:36 - 03:15 Phase #4: Persistence
03:16 - 03:54 Phase #5: Covering Tracks
03:55 - 04:25 Final Thoughts & Call to Actions
------

-- Tags
#penetration #testing #phases
Рекомендации по теме