In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1. Information gathering
2. Determining network range
3. Identifying active machines
4. Finding open ports and applications
5. OS fingerprinting
6. Fingerprinting services
7. Mapping the network

Explore More

Critical SQL Injection in singforyou.net

Security Researcher $@T0R! has reported another Critical SQL Injection in singforyou.net SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an

XP Registry tricks II

Easy Text Size Change in Help & IE Tip:I mentioned a way that you can change the size of the text that is display in the Help file and in

Latest common commercial hacking tools (Price, working etc)

Here are some of the latest hacking tools marketed just like commercial software across different ICQ channels. Just like normal software deep discounts and regular updates are also available for