Begin your Ethical Hacking journey. This documentation shares tricks and free software available to start the journey. There are several tutorials, AI can also assist, to help setup and learn the craft. This is an exciting, frustrating and overall challenge but is rewarding.
- Check out the Cybersecurity mentoring notes
- Setup your environment : get started here Computer Resources
- Update your local VM docker instance to use network address vs. localhost for JuiceShop : start here
- Getting started **hacking ** your JuiceShop and learn more about how to solve flags: start here
- https://vagrantcloud.com/api/v2/vagrant/bento/ubuntu-22.04
- YouTube channel building environments videos and other things I have became obsessed with.
- #1 - Build Beginner Ethical Hacking Envionment with OWASP JuiceShop
- #2 - Build Ubuntu server with Vagrant on MacBook with sample vulnerable applications
- #3 - Getting Started hacking your local JuiceShop instance
Part of a penetration test is checking for malware vulnerabilities. When performing a penetration test, the penetration tester follows a set of steps:
- Scan for open ports.
- Scan for running processes.
- Check for suspicious or unknown registry entries.
- Verify all running Windows services.
- Check startup programs.
- Look through event log for suspicious events.
- Verify all installed programs.
- Scan files and folders for manipulation.
- Verify that device drivers are legitimate.
- Check all network and DNS settings and activity.
- Scan for suspicious API calls.
- Run anti-malware scans.
- Document results and findings.
- Run a full TCP port sweep with
masscanto quickly identify exposed services at scale. - Validate
masscanfindings withnmap -sV -sCto confirm versions and default script results. - Use
nmap -Oand service fingerprinting to identify unexpected operating systems and hosts. - Run targeted
nmapNSE vulnerability checks (for SMB, RDP, HTTP, SSL/TLS, and DNS). - Use
nmapUDP scans (-sU) for high-risk services like DNS, SNMP, and NTP. - Identify weak TLS ciphers and certificate issues on exposed HTTPS services.
- Check SMB shares, signing settings, and anonymous access exposures.
- Audit RDP and SSH hardening (MFA, lockout policy, weak auth settings, legacy protocol support).
- Enumerate local admins and privileged groups for unauthorized or stale accounts.
- Verify scheduled tasks and cron jobs for persistence mechanisms and suspicious commands.
- Inspect PowerShell logs and command history for encoded or obfuscated execution patterns.
- Baseline outbound connections and detect beaconing to unknown IPs/domains.
- Inspect DNS query logs for tunneling patterns, DGA-like domains, and unusual record types.
- Check endpoint security controls (EDR/AV/firewall) for tampering, disabled agents, or policy drift.
- Re-test remediated findings and record evidence (commands, output, timestamps, and risk ratings).