Monthly Archives: April 2018

Week 8 (Social Engineering)

The topic of today’s presentation is social engineering. The goal behind social engineering is to obtain all possible information which can be obtained through communication such as telephone call or simply by talking. Processes such as interview and interrogation can … Continue reading

Posted in Ethical Hacking and Penetration Test | Comments Off on Week 8 (Social Engineering)

Week 7 (DVWA installation)

In brief, DVWA or Damn Vulnerable Web Application is a web application whose goal is to provide a place for security professionals or also students like us to practice our skills and tools without having to worry about getting caught … Continue reading

Posted in Ethical Hacking and Penetration Test | Comments Off on Week 7 (DVWA installation)

Week 6 (Port Scanning)

In this session, both classes were combined and the topic we learned is about port scanning. Port Scanning is a process which involves scanning of different port in order to find opened ones. The purpose of port scanning is to … Continue reading

Posted in Ethical Hacking and Penetration Test | Comments Off on Week 6 (Port Scanning)

Week 5 (Enumerating Target)

In this week’s session, we were introduced to enumeration. It is the phase which allows us to extract useful information from users such as the usernames, passwords, last login time, resources or materials shared on the network and etc from … Continue reading

Posted in Ethical Hacking and Penetration Test | Comments Off on Week 5 (Enumerating Target)

Week 4 (Target Discovery)

On this week, the session was begun with a trial to retrieve one’s information in the laptop by using a website. One of the students was told to click on a link and to surf it. As a result, some … Continue reading

Posted in Ethical Hacking and Penetration Test | Comments Off on Week 4 (Target Discovery)