TROJAN HORSE SECURITY IS TEACHING THESE CONCEPTS FOR EDUCATIONAL PURPOSES ONLY. WE DO NOT CONDONE ILLEGAL HACKING. TROJAN HORSE SECURITY CONSULTANTS ARE HIRED AS ETHICAL HACKERS AT THE REQUEST OF ORGANIZATIONS WITH PERMISSION TO HACK THEIR NETWORKS AND SYSTEMS.
Ethical Hacking is one of the most interesting, fun things a person can do. It takes a lot of technical knowledge to do but, once a person has a solid foundation in IT concepts, learning the hacking methodology is easy and fun!
In these pages you will learn the basics of discovery, enumeration, exploitation and post exploitation to use in your own organizations and home networks.
PART 2: ENUMERATION
PART 3: EXPLOITATION
PART 4: POST EXPLOITATION / ESCALATION