0% found this document useful (0 votes)
59 views38 pages

Not in Deep 2. in Depth Test

The document discusses various cybersecurity topics including: 1. Virtual machines can be connected to physical networks or bridged together using tools like vmnet1. Vulnerable systems like Metasploitables can be used for testing security tools. 2. The five phases of a hack are reconnaissance, scanning, gaining access, maintaining access, and clearing tracks. Reconnaissance involves passive information gathering or active interaction. Scanning finds details on network ports. 3. Key cybersecurity terms are explained briefly such as exploits, payloads, zero-day attacks, doxing, botnets, and types of hacking like denial of service attacks.

Uploaded by

BHARATH S R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views38 pages

Not in Deep 2. in Depth Test

The document discusses various cybersecurity topics including: 1. Virtual machines can be connected to physical networks or bridged together using tools like vmnet1. Vulnerable systems like Metasploitables can be used for testing security tools. 2. The five phases of a hack are reconnaissance, scanning, gaining access, maintaining access, and clearing tracks. Reconnaissance involves passive information gathering or active interaction. Scanning finds details on network ports. 3. Key cybersecurity terms are explained briefly such as exploits, payloads, zero-day attacks, doxing, botnets, and types of hacking like denial of service attacks.

Uploaded by

BHARATH S R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

1.

Not in deep
2. In depth test.
We use hypervisor for VM

Here we can use vmnet1 for all virtual machines to connect with them.

Or we can bridge it to production or home network.


Brige the VMS to physical network 192 as shown below them associate with vmnwt 0 after brigiing
vmneto0

Then connect bobs pc to vmnet1 with enabling dhcp in bobs pc.

1. To configure VMS go to
Make each virtual adapters to communicate with VM
Metaspolitable is an Ubantu Flavor. It contains many vulnablites. It can be used for testing tools

Ex:- windows has lot of vulnerabilities without updates.


Bring all the VMS to VMNET0

Windows 8 VM
For windows 12:
Windows physical machine IP
Win 10 pysical machine
Change the IP of Kali Linux Machine:

Method 1

Method 2
The launguages in CEH:

Vulnerability: Device is in weakness Mode & hacker is ready to attack. Causing dos attack etc.

Exploit:

If an attacker does leverages and successful then the Breach or compromise of a system is known as
exploit. The exploit is successful because vulnerability is successful.

Payload:

Payload is the component of attack that performs intedended malcius functions or actions which could
destroys protocol stack.

Zero day attack:

It exploits a computer system using vulnerabilities, that vulnerability does not have a patch for
developer & manufacturer

Daisy Chaining:

It involves to get access from one network to other. using that it can do further investigation on other
devices. Ex: internal to DMZ
Doxing:

Publising personal info on public.

Bot:

It is software application that be controlled remotely to execute or automate a task.

It is group to launch an attack. Botnet systems do a SYN attack or Dos attack using 10000 computres,

Info sec systems:

Company implementing security systems.


5 phases of hacking:

Reconnaissance: Simply gathering information about target is known as Reconnaissance.

Types:

1. Passive Reconnaissance: Any Direction interaction with target. Ex: google, news, public record
of recompany.
Active Reconissance: Interacting directly with target Ex: making calls, looking for info, job
interview.

2. Scanning:
Port scaaneers, nmap, dialing to pull information. Details of network ports.
3. To gain access: to get control over system from compromise system.
4. Maintaining an access: Backdoor, Trojan entry for future access.
5. Clear our tracks.

You might also like