Foundations of Security Week2 Seminar: Ethical Hacking Phases

272 字
1 分钟
Foundations of Security Week2 Seminar: Ethical Hacking Phases

Practical Session Plan: Ethical Hacking Phases#

Objective:#

To introduce you to ethical hacking by performing basic tasks related to the phases in a controlled environment.

Phases of Ethical Hacking Continue…#

Ethical hacking is distributed into six different phases.

Phase 1: Reconnaissance#

Task1: Perform passive information gathering#

  • Open your web browser and in your search engine (eg www.bing.com) search for site:example.com filetype:pdf
  • Replace example.com with an actual website.

Task2: Perform passive information gathering with Whois Lookup#

  1. Download whois from this link https://learn.microsoft.com/en-us/sysinternals/downloads/whois
  2. Extract the zip file
  3. Open Command Prompt and navigate to (cd C:\Users\colli\Downloads\WhoIs) the directory of the extracted
  4. Type whois brookes.ac.uk
123-4

Task3: Perform passive information gathering with online tool Netcraft#

  1. Go to https://sitereport.netcraft.com
  2. Type brookes.ac.uk
12

Phase 2: Scanning#

Task4: Scan for open ports and vulnerabilities#

  1. a. Download and Install Angry IP Scanner from https://angryip.org/download
Angry IP Scanner

  1. Scan local devices for open ports and vulnerabilities.
  2. Find the device with IP address 192.168.1.XX in the list

Phase 3: Gaining Access (File Services)#

Task5: Attempt access public folder or login using weak credentials#

  1. Attempt to gain access to the public folder of the device with IP address \\192.168.XX.XX in your previous task.
  2. Attempt to gain access to the computer as a user using a weak password
12

Phase 5: Clearing Tracks#

Task5: Clear the Security event logs#

If you have been able to gain admin access, Open PowerShell on your machine and run:

Terminal window
Invoke-Command -ComputerName TARGET_PC -ScriptBlock { wevtutil cl Security }

(Replace TARGET_PC with the real hostname or IP.)

Phase 6: Reporting#

Task6: Document findings#

Create a simple report using:

  1. Screenshots of scans.
  2. A list of open ports and possible vulnerabilities.
  3. Security recommendations.

Gaining Access: (Web Services and Web Data)#

Our next session will explore gaining access via web services

SQL Injection

支持与分享

如果这篇文章对你有帮助,欢迎分享给更多人或赞助支持!

赞助
Foundations of Security Week2 Seminar: Ethical Hacking Phases
https://firefly.anka2.top/posts/obu/level5/semester2/fos/week2/seminar/
作者
🐦‍🔥不死鸟Anka
发布于
2026-03-19
许可协议
CC BY-NC-SA 4.0

评论区

Profile Image of the Author
A-n-k-a
Over the Frontier / Into the Front
看这里~
合作翻译官绝赞招募中!
音乐
封面

音乐

暂未播放

0:00 0:00
暂无歌词
分类
标签
站点统计
文章
59
分类
6
标签
20
总字数
550,118
运行时长
0
最后活动
0 天前

目录