Tools and commands used in PTPs’ Labs.

  1. Process Explorer:- uses to analyze the processes that run on Windows OS and check what techniques are used to mitigate the BOF attack.

Lab1 :-

1* python3 -m http.server 8080:- makes the device work as a http server. So, the folders and files will be public and can be accessed by: http://ip of that device.

ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ

Created on 31 July 2021

Edited on 31 July 2021


1* Architecture Fundamentals:-

CPU is used to execute the machine codes of programs.

The machine code is in hexadecimal. Then, it is translated to Assembly language or mnemonic. It is a readable language.

Netwide is an example of an assembly language.

Every CPU has its own ISA Instruction Set Architecture.


Chapter1; Introduction to Ethical Hacking.

Information security:- refers to the protection or safeguards of information or information system that use, store, transmit information from disclosure, alteration or destruction.

Information security elements:-

  1. Confidentiality:-Insure that information can be accessible by only authorized users. ex:- data classifications, data encryption.
  2. Integrity:-Insure that information can…


  1. sudo →to run the command as an administrator, but we should enter the password.
  2. sudo apt install -y kali-grant-root && sudo dpkg-reconfigure kali-grant-root. Then select “Enable password-less privilege escalation” → to use sudo to run the command as an administrator, but without entering the password.
  3. sudo su →to use the…

NOTE:- This write up is just my notes for PTS course. It does not dispense with what is offered by the elearnsecurity.

Tools:-

  1. wireshark:-is a protocol analyzer network sniffer, which allows to see the data transmitted over the network. (you will see if the data sent in clear-text or encrypted)
  2. Burp…

Information I got from “Assessment test”:-

To compute CIDR from subnet mask:-

we convert the number to binary and count the ones

To compute CIDR from IP address given the number of hosts:-

we do it by trying each CIDR until we get close to the given number of hosts

To do that First:- subtract the…


Date:-22/8/2020

Hi there!

In this file I will explain each command in “Starting Point Challenge”.

So, are you ready?!

Starting Point Challenge has 6 steps!!

First: Software:-

It asks you to download virtual machine using virtualBox or vmware.

For me i installed Kali linux in virtualBox.

This is a YouTube video link…

HackingSkills

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store