IT Consulting | Online Security | Network Security | Computer Security

PART 0: PREPARATION

TROJAN HORSE SECURITY IS TEACHING THESE CONCEPTS FOR EDUCATIONAL PURPOSES ONLY. WE DO NOT CONDONE ILLEGAL HACKING. TROJAN HORSE SECURITY CONSULTANTS ARE HIRED AS ETHICAL HACKERS AT THE REQUEST OF ORGANIZATIONS WITH PERMISSION TO HACK THEIR NETWORKS AND SYSTEMS.

 

 

To get started with hacking, you will need to have a computer with a linux operating system. The easiest and quickest option is to download and Kali Linux http://www.kali.org/downloads/. The reason is because it comes with the most commonly used hacking tools that are used.

 

When you install Kali, remember to choose the option to encrypt your hard drive; you never know what sensitive information you'll have on there by the end of this training!

 

During installation, Kali allows you to configure a password for the root user. However, if you boot the live image instead, the i386, amd64, VMWare and ARM images are configured with the default credentials as follows:

 

Username: root

Password: toor

 

Once logged in, you'll find you have a windows type GUI with a menu bar. Some tools can be accessed from the Applications > Kali Linux menu but you'll more than likely access most tools from the command line.

 

You may want to install VM Player (https://my.vmware.com/web/vmware/downloads) with and install Windows VM so that you can use some of the Windows hacking tools and utilize some of the Windows commands and features. Although not necessary, this comes down to you preferences.

 

Now that you are ready, let's move on to the next part...

 

PART 1: DISCOVERY