Web Application Attack Phase Information Gathering  Information gathering is always the first step whether it is web application attack or other kind of hacking attacks Before performing exploit on a target web application , it is required to gather all information about the target web application . The information mayContinue Reading

The Linux and Windows operating systems do have a good number of things in common, and one of them is the need for users and groups. Since you will encounter Linux systems, we need to look at them as well. A typical account used to log in to a LinuxContinue Reading

The Microsoft Windows operating system is designed to be used as either a stand-alone or networked environment; however, for this discussion you will assume a networked setup only. In the Windows world, securing access to resources, objects, and other components is handled through many mechanisms, with some common threads asContinue Reading

Enumeration is the process of extracting information from a target system to determine more of the configuration and environment present . In many cases it is possible to extract information such as usernames , machine names shares and services  from a system as well as other information , depending onContinue Reading

Hacking Simply Refers To gainning Unauthorized Access Into A System¬† or we can also say that aim of Hacking is “To compromise the security of a system in order to gain Access into it” Note : Hacking is unauthorized intrusion into a compute or a network.The person engaged in hackingContinue Reading