Security, Methodology, Hacker Method, CEH
Video Walkthrough
Task 1 - Methodology Outline
What is the first phase of the Hacker Methodology?
Reveal Flag đ©
Task 2 - Reconnaissance Overview
Who is the CEO of SpaceX?
Reveal Flag đ©
Do some research into the tool: sublist3r, what does it list?
Reveal Flag đ©
What is it called when you use Google to look for specific vulnerabilities or to research a specific topic of interest?
Reveal Flag đ©
Task 3 - Enumeration and Scanning Overview
What does enumeration help to determine about the target?
Reveal Flag đ©
Do some reconnaissance about the tool: Metasploit, what company developed it?
Reveal Flag đ©
What company developed the technology behind the tool Burp Suite?
Reveal Flag đ©
Task 4 - Exploitation
What is one of the primary exploitation tools that pentester(s) use?
Reveal Flag đ©
Task 5 - Privilege Escalation
In Windows what is usually the other target account besides Administrator?
Reveal Flag đ©
What thing related to SSH could allow you to login to another machine (even without knowing the username or password)?
Reveal Flag đ©
Task 6 - Covering Tracks
I read this section!
Task 7 - Reporting
What would be the type of reporting that involves a full documentation of all findings within a formal document?
Reveal Flag đ©
What is the other thing that a pentester should provide in a report beyond: the finding name, the finding description, the finding criticality
Reveal Flag đ©
đ©remediation recommendation