Monthly Archives: March 2018

Week 3 (Tool Engine)

In this session, we continued the previous slide with the explanation about Domain Name Service (DNS) and how it works and how are they vulnerable. With the help of command prompt in Paros Proxy, we can explore the DNS zone … Continue reading

Posted in Ethical Hacking and Penetration Test | Comments Off on Week 3 (Tool Engine)

Week 2 (Information Gathering)

On the second meeting (Week 2), we began our course with the explanation about target scoping. Most of the components in target scoping such as preparing test plan, gathering client information and etc. are checklists for the preparation of penetration … Continue reading

Posted in Ethical Hacking and Penetration Test | Comments Off on Week 2 (Information Gathering)

Week 1

On the first week of this “Ethical Hacking and Penetration Test” course, we are introduced on what are the basic components in Ethical Hacking. In addition, we are also told about the different kind of groups of people who are … Continue reading

Posted in Ethical Hacking and Penetration Test | Leave a comment