In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1. Information gathering
2. Determining network range
3. Identifying active machines
4. Finding open ports and applications
5. OS fingerprinting
6. Fingerprinting services
7. Mapping the network

Explore More

Hackers

Many peoples ask me, what is hacker? I want to be hacker? What What and How How…. Read it. It’s Hacker Attitude. The Hacker Attitude Hackers solve problems and build

Password breaking service (Stolen password recovery)

Last month we had about 400 emails asking details on how to break into the email account. The reason many of them put forward are ‘they forgot and got important

Complete MySQL Injection

Credit go to sam207 TABLE OF CONTENT: #INTRO #WHAT IS DATABASE? #WHAT IS SQL INJECTION? #BYPASSING LOGINS #ACCESSING SECRET DATA #Checking for vulnerability #Find the number of columns #Addressing vulnerable