Cyber Security is not about attact Someone's whatsapp or password. It's about exploiting someone mind
Cyber Security persons are Geniuses. Not Because they are smart, but because they can Control the whole World with a click of a button
Enroll NowAndroid Vulnerability Detection
System Exploiting
SQL Injection
Javascript
PHP
SQL
This is the first step of cyber security. It is also called as Footprinting and information gathering Phase.
This phase includes the usage of tools like dialers, port scanners, network mappers, sweepers, and vulnerability scanners to scan data.
In this phase, the security analyst designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2.
Once a the cyber security person has gained access, they want to keep that access for future exploitation and attacks. Once the cyber security person owns the system, they can use it as a base to launch additional attacks.
Prior to the attack, the attacker would change their MAC address and run the attacking machine through at least one VPN to help cover their identity.