Categories
Cyber Security TECH & CYBERSECURITY

The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities […]

Categories
Hacking TECH & CYBERSECURITY

The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done […]

Categories
TECH & CYBERSECURITY

FSociety: A Penetration Testing Framework

Penetration Testing also known as Ethical Hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. It can either be automated with software applications or performed manually. FSociety is an open source penetration testing framework that consists of a variety of hacking tools […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts

Cybersecurity and Ethical Hacking Certifications: Many organizations are facing security threats than ever before. Data Breaches are growing in number, and sizes and systematic hacks of company resources are taking place more frequently. These signs indicate that the cybersecurity skills are highly great demand and a good field to launch your IT career path. As […]