Ethical hacking

My Table

Unit 4

S No. Course Content:
1 Enumeration: Enumeration Techniques
2 Soft Objective
3 Looking Around or Attack
4 Elements of Enumeration
5 Preparing for the Next Phase Exploitation: Intutive Testing
6 Evasion
7 Threads and Groups
8 Operating Systems
9 Password Crackers
10 RootKits
11 applications
12 Wardialing
13 Network
14 Services and Areas of Concern

Comments

Popular posts from this blog

OpenSolaris and Linux virtual memory and address space structures

Tagged architectures and multi-level UNIX

Tying top-down and bottom-up object and memory page lookups with the actual x86 page translation and segmentation