The Hacker Methodology

Hiteshverma
1 min readFeb 27, 2024

--

Task 1 Methodology Outline

What is the first phase of the Hacker Methodology?

Ans: Reconnaissance

Task 2 Reconnaissance Overview

Who is the CEO of SpaceX?

Ans: elon musk

Do some research into the tool: sublist3r, what does it list?

Ans: subdomains

What is it called when you use Google to look for specific vulnerabilities or to research a specific topic of interest?

Ans: Google Dorking

Task 3 Enumeration and Scanning Overview

What does enumeration help to determine about the target?

Ans: Attack surface

Do some reconnaissance about the tool: Metasploit, what company developed it?

Ans: Rapid7

What company developed the technology behind the tool Burp Suite?

Ans: portswigger

Task 4 Exploitation

What is one of the primary exploitation tools that pentester(s) use?

Ans: metasploit

Task 5 Privilege Escalation

In Windows what is usually the other target account besides Administrator?

Ans: system

What thing related to SSH could allow you to login to another machine (even without knowing the username or password)?

Ans: keys

Task 7 Reporting

What would be the type of reporting that involves a full documentation of all findings within a formal document?

Ans: full formal report

What is the other thing that a pentester should provide in a report beyond: the finding name, the finding description, the finding criticality

Ans: remediation recommendation

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Hiteshverma
Hiteshverma

No responses yet

Write a response