IP Address Exploitation

1. Setting Up Your Environment
1.1 Installing Tools
2. Reconnaissance: Footprinting
2.1 Passive Recon
3. Scanning: Port Scanning and Service Detection
3.1 Port Scanning with Nmap
3.2 Service Detection
3. Enumeration: Extracting More Details
4.1 SMB Enumeration
4.2 SSH Enumeration
5. Exploitation: Gaining Access
5.1 Exploiting SMB with Metasploit
5.2 Brute Forcing SSH
6. Post-Exploitation: Maintaining Access
6.1 Privilege Escalation
6.2 Creating a Backdoor
7. Covering Your Tracks
7.1 Log Removal
8. Reporting
Last updated
