Tools and commands used in PTPs’ Labs.
1* python3 -m http.server 8080:- makes the device work as a http server. So, the folders and files will be public and can be accessed by: http://ip of that device.
Created on 31 July 2021
Edited on 31 July 2021
1* Architecture Fundamentals:-
CPU is used to execute the machine codes of programs.
The machine code is in hexadecimal. Then, it is translated to Assembly language or mnemonic. It is a readable language.
Netwide is an example of an assembly language.
Every CPU has its own ISA Instruction Set Architecture.
Chapter1; Introduction to Ethical Hacking.
Information security:- refers to the protection or safeguards of information or information system that use, store, transmit information from disclosure, alteration or destruction.
Information security elements:-
NOTE:- This write up is just my notes for PTS course. It does not dispense with what is offered by the elearnsecurity.
To compute CIDR from subnet mask:-
we convert the number to binary and count the ones
To compute CIDR from IP address given the number of hosts:-
we do it by trying each CIDR until we get close to the given number of hosts
To do that First:- subtract the…
In this file I will explain each command in “Starting Point Challenge”.
So, are you ready?!
Starting Point Challenge has 6 steps!!
It asks you to download virtual machine using virtualBox or vmware.
For me i installed Kali linux in virtualBox.