<aside>
🌙
Page is under construction — some pages may be empty
</aside>
Hacking 101 - How to become a hacker (WIP)
GitHub - ClaudiasLibrary/hacking-101: A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.
Introduction
Internet
Intro to Cybersecurity & Careers
Linux, Windows + other OSs
Security Awareness
OSI Model Layers
Tools
Malware
Offensive Security
Stages of Penetration Testing
Penetration testing, also known as pen testing, is a simulated cyber attack performed by ethical hackers to identify and exploit vulnerabilities in a system, network, or application. The process generally follows several key stages:
Information Gathering and Vulnerability Scanning:
Information Gathering And Vulnerability Scanning
- Scope Definition: Define the goals, scope, rules of engagement, and boundaries of the test, including what systems are to be tested.
- Information Gathering: Collect as much information as possible about the target. This can include:
- Threat Modeling: Identify potential threats and vulnerabilities based on the gathered information.