Week 2

In the second week of ethical hacking, we explored the very beginning of the hacking process, understanding the target and gathering as much information as possible before any actual attacks or scans happen. 


Target Scoping
Target scoping is all about setting boundaries. Ethical hackers need to know what systems or domains they’re allowed to test and under what conditions. This ensures everything stays legal, ethical, and clearly defined before moving forward.

Information Gathering (Footprinting)
Once the scope is set, the next step is information gathering, often called footprinting. This involves collecting publicly available data about a target, usually without interacting directly with its systems. It's a passive but powerful way to learn about the target's digital presence.

Tools

Whois, Host, Dig.

Lessons learnt

How to gather public documents and online data about an organization.

The basics of DNS enumeration and how to use it to map out a target.

How to identify possible routing and network paths used by a company.

Comments

Popular posts from this blog

Final Reflection

Week 10

Week 8