April, 2018

  • 12 April

    Location and Geography

    Location and Geography

    Location and Geography: Not to be overlooked or underestimated in value is any information pertaining to the physical location of offices and personnel. You should seek this information during the Footprinting process because it can yield other key details that you may find useful in later stages, including physical penetrations. …

  • 11 April

    Download Complete Python Bootcamp: Go From Zero To Hero in Python 3

    Complete Python Bootcamp: Go From Zero To Hero in Python 3

    COMPLETE PYTHON BOOTCAMP: Learn Python Now! Start from the very basics and go from creating your very own applications and games. Created By: Jose Portilla Last Updated: 3/2018 Best Selling / English Course   What Will You Learn: You will learn Python professionally, which includes python 2 and 3 versions. …

  • 10 April

    Terminology in Footprinting

    Terminology in Footprinting

    Terminology in Footprinting: In this section you will learn definitions that may appear on the CEH v10 (Certified Ethical Hacking) exam.   Open Source and Passive Information Gathering As far as intelligence gathering goes, open source or passive information gathering is the least aggressive, basically, the process relies on obtaining …

  • 9 April

    Secure Sockets Layer

    Secure Sockets Layer

    Secure Sockets Layer: Another important mechanism for securing information is Secure Sockets Layer (SSL). The SSL protocol was developed by Netscape in the mid-1990s and rapidly became a standard mechanism for exchanging data securely over insecure channels such as the Internet. NOTE: SSL is supported by all modern browsers and …

  • 8 April

    Understanding the Steps of Ethical Hacking

    Understanding the Steps of Ethical Hacking

    Understanding the Steps of Ethical Hacking: For an overview of the process, let’s look at the steps of ethical hacking to see where Footprinting fits in as well as what future phases hold. Phase 1: Footprinting Footprinting is the first phase of the ethical hacking process and is the subject …

  • 7 April

    Hacking: Current Developments

    Hacking: Current Developments

    Current Developments: In the early 2000s, more malicious activity started to appear in the form of more advanced attacks. In the first few years of the new millennium, the aggressiveness of attacks increased, with many attacks criminally motivated. Malicious attacks that have occurred include the following (although there are many …

  • 6 April

    So, What is an Ethical Hacker?

    So, What is an Ethical Hacker?

    What is an Ethical Hacker: When you explore this blog and the tools it has to offer, you are learning the skills of the hacker. But we can’t leave it at that, because you need to be an ethical hacker, so let’s explore what that means. Ethical hackers are employed …

  • 5 April

    Reporting a Security Incident

    Reporting a Security Incident

    Reporting a Security Incident: Once an incident has been responded to and a team has gotten involved to assess the damage and start the cleanup, the required parties will need to be informed. These parties be will responsible for getting the ball rolling whether it is legal action, an investigative …

  • 4 April

    Competitive Analysis

    Competitive Analysis

    Competitive Analysis: We have covered some great tools so far, but there is another way of gathering useful data that may not seem as obvious; Competitive Analysis. The report created through competitive analysis provides information such as product information, project data, financial status, and in some cases intellectual property. Good …

  • 3 April

    Complying with Privacy and Security Regulations

    Complying with Privacy and Security Regulations

    Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies are key components of a security management policy. These agencies have made large improvements over the last several years to ensure the privacy of information; several laws have been passed …