I am an CEH V8 certified ethical hacker 2014.
The candidate will be provided with a target IP Address / Application. The objective is to do complete vulnerability analysis of the target system & then carry out Penetration Testing, within the alloted time.
We recommend you should be familiar with: Metasploit Social Engineering Tool-kit Vulnerability scanners Debuggers/Disassemblers Use of Web-Shells / Backdoors
This is a question for clearing an information security exam at national level they are giving marks even for approach even if we are not successfully exploiting the target. I would be grateful if someone helps me in this regard.
Aucun commentaire:
Enregistrer un commentaire