Mar
29
2018
--

Weekly Journal for Ethical Hacking part 2 Week 5

I had assignment to try to Enumerate three website that our teacher gave to us.

wp1.pentest.id, jo1.pentest.id, and pentest.id.

Our goal is to try to enumerate this three websites.

To enumerate this website, we would need to know their ip address first. Using https://ipinfo.info/html/ip_checker.php , we could found out what these websites IP address is.

wp1.pentest.id = 87.98.172.193

jo1.pentest.id = 87.98.172.193

pentest.id = 104.28.31.3

Apparently, wp1 and jo1 has the same IP addresses. Now we will be using nbtstat to enumerate these website.

There is no host could be found for each of this ip addresses. Some said it’s because my firewall is blocking my computer to find the results. I haven’t try to figure out this results.


Update:

This time I will check the enumeration for this websites in both home and Binus Universtiy area. If both still failed, then the real final conclusion is that I’m still failed.

—————————————————————————————

Conclusion:

Firewall blocked me from checking others ip addresses access. The continuation of this research continued in next week when I used this IP Address on my nmap to see their vulnerabilities.

Written by brigitta in: hacking journal |
Mar
15
2018
--

Weekly Journal for Ethical Hacking Part 1 Week1

This is the first day we are learning about Ethical hacking. Sir Charles Lim is the one that will mostly taught as about this.

Our Goal is to learn about Ethical hacking and its rules.

We were taught that ethical hacking is different from the usual hacking we heard in the medias. Ethical hacking means that you must have a permission by the owner to break into their networks security, or penetration test.

Penetration test is a legal attempt for the hacker to find the weakest link in the network. But they are not allowed to try to fix the issues, only report their findings. While for Security Tester, they are allowed to give solutions to protect the networks better.

Having a knowledge on programming languages like Perl, C, and Python would help with hacking even more. For the starter of hacking, it would be better if theu used Tiger Box, because it already has a lot of OS and hacking tools.

He reminded us that we would need to know the rules about hacking first before we try to hack anything.

The first step you have to do before hacking is to collect information about the networks you are going to break as many as possible, no matter how small the info is. Sir Charles Lim shared with us a lot of interesting website we can use for helping us to collect information necessary to help us hacking.

This websites above show all the tools could be used for looking information.

Using this both websites, I used an IP address to find more information about the network like the location.

Conclusion:

Knowledge is power. That’s the reason you can’t hack without this information.

Written by brigitta in: hacking journal,Uncategorized |

Powered by WordPress. Theme: TheBuckmaker. Zinsen, Streaming Audio