UC3ETH051 – Scanning victim

UC3ETH051 – Scanning victim

When initiating the scanning process, there was an issue alreasdy with trying to find the victim. I wanted to do this as a Black Box hacking, where I new nothing of the victim. Not even the IP address. This proved difficult, because – perhaps due to the strange...
UC3ETH051 – Metasploitable3

UC3ETH051 – Metasploitable3

Most of the tutorials we are assigned to do in this course seem to be related – one after the other. I find this to be a good thing, and you get to set your system up step by step. The next step for me now is to install Metasploitable3 and perform som scans to...
UC3ETH051 – Footprinting

UC3ETH051 – Footprinting

The next part of the Kali Linux venture we were asked to try out some of the functions found native in the command prompt and in a couple of tools. The reason for doing this is to see what you can get out of very simple scanning online. First of were some simple ones,...
UC3ETH051 – Kali Linux setup

UC3ETH051 – Kali Linux setup

First tutorial was simple, but time consuming. Our mission was to install a virtual machine (Virtualbox) and mount a Kali Linux installation on it. The time consuming part was mostly due to downloading and setting things up – but since Offensive Security...
UC3ETH051 – Ethical hacking

UC3ETH051 – Ethical hacking

Today we started a new course, Ethical Hacking. I have been very exited about taking this course, since it is both a practical and theoretical course in relation to penetration testing. Some of the topics we will be covering is: Setting up technological and...