Module 4: Offensive Cybersecurity - Introduction to Hacking
Ethical hacking (or Penetration Testing) is a formalized process, not just random clicking. We follow a clear, repeatable methodology.
The Five Phases of Hacking (PTES Standard)
- Reconnaissance (Information Gathering): Gathering information about the target without direct interaction.
- Scanning and Enumeration: Interacting with the target to discover open ports, services, and vulnerabilities.
- Gaining Access (Exploitation): Launching an attack to exploit a vulnerability and gain initial access.
- Maintaining Access (Persistence): Ensuring future access and embedding backdoors (if permitted by scope).
- Covering Tracks & Reporting: Clearing logs, removing backdoors, and documenting all steps and findings.
Red Team vs. Blue Team
- Red Team: Acts as the attacker, focusing on finding and exploiting vulnerabilities.
- Blue Team: Acts as the defender, focusing on detection, response, and prevention (what we covered in Module 3).
- Purple Team: A collaborative approach where Red and Blue teams work together to improve security posture.