Posts

Main Home

Image
Rozgar Siksha - Home 🎓 Rozgar Siksha Learn Skills & Get Jobs in Hindi 📊 Business Skills 💻 Tech Skills 🏛 Govt Exam Prep 📢 Job Alerts 📝 Fill Job Form

📡 CEH Module 3: Scanning & Enumeration – Uncovering Open Doors in Networks

  📡 CEH Module 3: Scanning & Enumeration – Uncovering Open Doors in Networks Welcome to Module 3 of the Certified Ethical Hacking (CEH) course — Scanning and Enumeration . After gathering information in the Footprinting phase , it’s time to take it a step further: we now interact with the target system to find live hosts , open ports , and running services . Let’s explore how hackers and security professionals detect what’s vulnerable before launching a real attack. 🔍 What is Scanning? Scanning involves using tools to actively probe the target system or network for open ports, services, and systems. Three types of scanning: Port Scanning – Detect open ports. Network Scanning – Identify active devices and IPs. Vulnerability Scanning – Find security loopholes or misconfigurations. view 🧩 What is Enumeration? Enumeration digs deeper. After identifying live systems, it retrieves specific data like: Usernames Network shares System details Ac...
  🕵️‍♂️ CEH Module 1: Information Gathering – Discover the Digital Footprints Welcome to Module 1 of the Certified Ethical Hacking (CEH) course — Information Gathering , also known as Footprinting . This phase is crucial in ethical hacking. Before testing a system or launching any attack simulation, an ethical hacker must first collect as much information as possible — without touching the target system directly . Sounds interesting, right? Let’s break it down step by step. 📖 What is Information Gathering? Information Gathering is the process of collecting data about a target system or organization using publicly available sources. It’s usually divided into two main types: ✅ Passive Information Gathering – No direct interaction with the target. ✅ Active Information Gathering – Direct interaction to get more in-depth data. 🧰 Top Tools, Commands & Websites for Information Gathering Let’s look at the most commonly used commands and websites that every et...

🔍 CEH Module 2: Scanning and Enumeration – The Art of Finding Open Doors

  🔍 CEH Module 2: Scanning and Enumeration – The Art of Finding Open Doors Welcome back to our Certified Ethical Hacker (CEH) series. After gathering initial intel in Module 1: Information Gathering , it's time to go a step further with Module 2: Scanning and Enumeration . In this phase, ethical hackers perform active reconnaissance — probing the target system to discover open ports , running services , OS versions , and network vulnerabilities . Let’s dive into the most commonly used tools , commands , and websites for scanning and enumeration. 🧠 What is Scanning? Scanning involves sending packets to a target and analyzing responses. It helps hackers (and security professionals) know what services are live and how they can be exploited . 🎯 What is Enumeration? Enumeration digs deeper after scanning — extracting detailed information like: Usernames Shared resources Network services System banners SNMP data ⚒️ Top Tools & Commands for Scanni...