Welcome To My Blog.
Welcome my friends.
I've created this blog for the beginners who are studying Ethical Hacking & Penetration Testing Methodologies.
When I was a beginner studying Ethical Hacking & Penetration Testing, I had some difficulties with few techniques and tools and I had to google them. But sometimes, answers are not so beginners' friendly.
So, I decided to create beginners' friendly tutorials that everyone can understand easily.
I will try to explain every tools and techniques I use in the tutorials as clearly as I can.
Actually I don't want to name "Tutorials" for the posts in this blog.
So , let's just keep them as the beginners' study companion.
I'll be using Kali Linux as my attacker machine.
I'll use some beginners' friendly Vulnerable CTF Machines (Capture the flag) as targets.
Both of my attacker machines and targets machines are in VMware workstation.
You can use any Hypervisors you feels comfortable with.
You can download Kali Linux as virtual machine from their official sites.
Kali Linux
Also , you will need the target to practice. It's the best to start with Metasploitable 2.
Metasploitable 2 is an intentionally vulnerable Linux virtual machine that can be used to conduct security training , test security tools and practice common penetration testing techniques.
You can download it from here.
There are tons of tools for Penetration Testing and Ethical Hacking purposes , but you have to choose the right tools/exploits for the vulnerability you found in order to exploit successfully.
Also , keep in mind that Penetration Testing Techniques are legal themselves and you can practice them in the safe environments, but if you misuse them on unauthorized targets , you'll be in serious trouble.
Have A Nice Day My Friends!
When I was a beginner studying Ethical Hacking & Penetration Testing, I had some difficulties with few techniques and tools and I had to google them. But sometimes, answers are not so beginners' friendly.
So, I decided to create beginners' friendly tutorials that everyone can understand easily.
I will try to explain every tools and techniques I use in the tutorials as clearly as I can.
Actually I don't want to name "Tutorials" for the posts in this blog.
So , let's just keep them as the beginners' study companion.
I'll be using Kali Linux as my attacker machine.
I'll use some beginners' friendly Vulnerable CTF Machines (Capture the flag) as targets.
Both of my attacker machines and targets machines are in VMware workstation.
You can use any Hypervisors you feels comfortable with.
You can download Kali Linux as virtual machine from their official sites.
Kali Linux
Also , you will need the target to practice. It's the best to start with Metasploitable 2.
Metasploitable 2 is an intentionally vulnerable Linux virtual machine that can be used to conduct security training , test security tools and practice common penetration testing techniques.
You can download it from here.
There are tons of tools for Penetration Testing and Ethical Hacking purposes , but you have to choose the right tools/exploits for the vulnerability you found in order to exploit successfully.
Also , keep in mind that Penetration Testing Techniques are legal themselves and you can practice them in the safe environments, but if you misuse them on unauthorized targets , you'll be in serious trouble.
Have A Nice Day My Friends!
Comments
Post a Comment