Академический Документы
Профессиональный Документы
Культура Документы
Not in deep
2. In depth test.
We use hypervisor for VM
Here we can use vmnet1 for all virtual machines to connect with them.
1. To configure VMS go to
Make each virtual adapters to communicate with VM
Metaspolitable is an Ubantu Flavor. It contains many vulnablites. It can be used for testing tools
Windows 8 VM
For windows 12:
Windows physical machine IP
Win 10 pysical machine
Change the IP of Kali Linux Machine:
Method 1
Method 2
The launguages in CEH:
Vulnerability: Device is in weakness Mode & hacker is ready to attack. Causing dos attack etc.
Exploit:
If an attacker does leverages and successful then the Breach or compromise of a system is known as
exploit. The exploit is successful because vulnerability is successful.
Payload:
Payload is the component of attack that performs intedended malcius functions or actions which could
destroys protocol stack.
It exploits a computer system using vulnerabilities, that vulnerability does not have a patch for
developer & manufacturer
Daisy Chaining:
It involves to get access from one network to other. using that it can do further investigation on other
devices. Ex: internal to DMZ
Doxing:
Bot:
It is group to launch an attack. Botnet systems do a SYN attack or Dos attack using 10000 computres,
Types:
1. Passive Reconnaissance: Any Direction interaction with target. Ex: google, news, public record
of recompany.
Active Reconissance: Interacting directly with target Ex: making calls, looking for info, job
interview.
2. Scanning:
Port scaaneers, nmap, dialing to pull information. Details of network ports.
3. To gain access: to get control over system from compromise system.
4. Maintaining an access: Backdoor, Trojan entry for future access.
5. Clear our tracks.