Introduction to Ethical Hacking

I was planning to write a detail article on the basis of ethical hacking and penetration testing that cover the methodology, reporting and other things but some of my friend has shared this wonderful presentation that covers each and everything about ethical hacking and the process. Below is the presentation that covers the beginning of ethical hacking and it will let you know the procedure of hacking and penetration testing.



  • Ethical Hacking
  • Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting
  • Why – Ethical Hacking Source: CERT/CC Total Number of Incidents Incidents
  • Footprinting
  • Enumeration & Fingerprinting
  • Identification of Vulnerabilities
  • Attack – Exploit the vulnerabilities
 







Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.