Join 74,292 users and earn money for participation
read.cash is a platform where you could earn money (total earned by users so far: $ 511,778.19).
You could get tips for writing articles and comments, which are paid in Bitcoin Cash (BCH) cryptocurrency,
which can be spent on the Internet or converted to your local money.
Takes one minute, no documents required
My Comments on Network and Bots and Pentest when I was a young student
This is the first assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish, and sell on condition to state my name as the author and notify that the original and open version available here. Since it is the first meeting, this only my comments about the first lecture but hopefully you get the picture about it.
About network servers I capture that the network consist of clients and servers. The clients requests informations and servers gives the information. I have tried using some server which includes web server, file server, mail server, dns server, and dhcp server but I'm still new especially on the security aspects of this servers.
I have heard bot network before, I played a game called hacker evolution that gives a picture of bots but I never tried them before. If I were on the hacker side I will hijack into other clients PC using malware. That malware will inform back to me and I can use the hijacked clients to do something for me for example sending spam mails, or make new bot (find other victims). Usually as an amateur I would directly hack to the targeted server, but with this method is more effective because instead of using my own PC, I can use other PCs as well. I wonder if I can practice this in virtual machine. By the way some links on the buttom of the page are dead.
DDOS or Denial of Service is very famous in hacking event among newcomers, which is to disable the service of a server. I have only practice this by flooding the traffic of a Wifi, the other I tried is on a server on client using many computer. The way I tried is very suitable using statement in number 2 using bots. By having many PC increases the computing power. About web defacement I have seen some sites have their contents hacked, either by modifying the contents or inserting new contents. Today there are many free tools available to scan for vulnerability, Nessus for example, and tools to exploit those vulnerability like Metasploit Framework. I'm only user of this tools so I still don't know the concept behind it. There also exist simple vulnerabilities due to misconfiguration for example MySQL injection that allows to use MySQL commands on login to bypass, or another one which I can modify the html page which allows to enter without password.