Skip to content

Ethical Hacking

Overview

Ethical hacking identifies vulnerabilities before malicious actors do.

Testing Methodologies

Penetration Testing

Add content about pentest phases and methodologies

Vulnerability Assessment

Add content about scanning and assessment tools

Social Engineering

Add content about human-targeted attacks

Common Attack Vectors

Social Engineering Techniques

  • Phishing: Email and website spoofing
  • Pretexting: Creating false scenarios
  • Baiting: Using physical media
  • Prevention: User training, email filtering

Malware Types

  • Ransomware: Data encryption for extortion
  • Rootkits: Deep system compromise
  • Keyloggers: Capturing keystrokes
  • Defense: Anti-malware, behavior analysis

Advanced Persistent Threats

  • Characteristics: Long-term targeted attacks
  • Goals: Espionage, data theft
  • Detection: Network monitoring, threat hunting

Built to share knowledge <3