Search the Community
Showing results for tags 'ethical hacking'.
-
While the tubes video below go through scenarios for ethical hacking. Can we start posting different "detailed" steps to do such ethical hacking for various scenarios. I would like to see step by step instructions from starting Tetra to using tools,acquiring etc. Go through each tool setup and use. I know HAK5 team has a online doc but can we start one to address how to"s with detailed steps. The PineAP book is good but want more details If Hak5 will allow ( subject to the forums ethical rules ----- can we start it here and post different scenarios ? If ok--separate each scenario with cut lines like below with Q&A to follow in each scenario If not ok to post please advise , or where to do such --all on the basis of ethical pen testing and educational uses for knowledge acquiring https://www.youtube.com/watch?v=eHnQwTCKe2o https://www.youtube.com/watch?v=ZiPAjruB1n4 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Scenario One I have been asked to test security for a group of people with cell phones and open router points who have assembled close to my location. What are the steps from starting the Tetra, Recon,Clients mode, Pine AP, etc.. Please list in steps 1,2,3 etc.. ---------------------------------------------------------------------------------------------------------- Scenario Two ------------------------------------------------------------------------------------------------------------ Scenario Three --------------------------------------------------------------------------------------------------------------------
- 1 reply
-
- hacking
- ethical hacking
- (and 2 more)
-
Penetration testing - raw data storage structure
3xNiks posted a topic in Business and Enterprise IT
Hi there, I've got a question. During a professional penetration test with a team of penetration testers for a client, what is an effective way to store raw data during and after the tests? With this question I am looking for a data storage (directory and files) structure. The goal of this structure is to make a general overview for al penetration testers. As example, when I performed a penetration test in the past and store my raw data (output tools, phases of testing, logging, etc) in an encrypted environment, and a colleague needs to perform another test for the same client, what is a fast and effective way for the colleague to see what I have done in the past. Or if a client asks for logging data? I am not looking for a tool, I am looking for a kind of structure with consistency which can help me. Does anybody know a kind of structure, methodology, checklists or have any suggestions regarding the storage? Regards,