Вы находитесь на странице: 1из 38

1.

Not in deep
2. In depth test.
We use hypervisor for VM

Here we can use vmnet1 for all virtual machines to connect with them.

Or we can bridge it to production or home network.


Brige the VMS to physical network 192 as shown below them associate with vmnwt 0 after brigiing
vmneto0

Then connect bobs pc to vmnet1 with enabling dhcp in bobs pc.

1. To configure VMS go to
Make each virtual adapters to communicate with VM
Metaspolitable is an Ubantu Flavor. It contains many vulnablites. It can be used for testing tools

Ex:- windows has lot of vulnerabilities without updates.


Bring all the VMS to VMNET0

Windows 8 VM
For windows 12:
Windows physical machine IP
Win 10 pysical machine
Change the IP of Kali Linux Machine:

Method 1

Method 2
The launguages in CEH:

Vulnerability: Device is in weakness Mode & hacker is ready to attack. Causing dos attack etc.

Exploit:

If an attacker does leverages and successful then the Breach or compromise of a system is known as
exploit. The exploit is successful because vulnerability is successful.

Payload:

Payload is the component of attack that performs intedended malcius functions or actions which could
destroys protocol stack.

Zero day attack:

It exploits a computer system using vulnerabilities, that vulnerability does not have a patch for
developer & manufacturer

Daisy Chaining:

It involves to get access from one network to other. using that it can do further investigation on other
devices. Ex: internal to DMZ
Doxing:

Publising personal info on public.

Bot:

It is software application that be controlled remotely to execute or automate a task.

It is group to launch an attack. Botnet systems do a SYN attack or Dos attack using 10000 computres,

Info sec systems:

Company implementing security systems.


5 phases of hacking:

Reconnaissance: Simply gathering information about target is known as Reconnaissance.

Types:

1. Passive Reconnaissance: Any Direction interaction with target. Ex: google, news, public record
of recompany.
Active Reconissance: Interacting directly with target Ex: making calls, looking for info, job
interview.

2. Scanning:
Port scaaneers, nmap, dialing to pull information. Details of network ports.
3. To gain access: to get control over system from compromise system.
4. Maintaining an access: Backdoor, Trojan entry for future access.
5. Clear our tracks.

Вам также может понравиться