20, 21 | FTP |
22 | SSH |
23 | Telnet |
25 | SMTP |
42 | WINS |
53 | DNS |
80, 8080 | HTTP |
88 | Kerberos |
110 | POP3 |
111 | Portmapper Linux |
123 | NTP |
135 | RPC-DCOM |
139 | SMB |
143 | IMAP |
161, 162 | SNMP |
389 | LDAP |
445 | CIFS |
514 | Syslog |
636 | Secure LDAP |
20, 21 | FTP |
22 | SSH |
23 | Telnet |
25 | SMTP |
42 | WINS |
53 | DNS |
80, 8080 | HTTP |
88 | Kerberos |
110 | POP3 |
111 | Portmapper Linux |
123 | NTP |
135 | RPC-DCOM |
139 | SMB |
143 | IMAP |
161, 162 | SNMP |
389 | LDAP |
445 | CIFS |
514 | Syslog |
636 | Secure LDAP |
Everyone has its own, but it usually consists of:
We do not refer to the Central Intelligence Agency but key concepts in ethical hacking:
Opposite would be:
Hacker’s needs to commit a crime are the same like in case of a regular crime:
Ethical Hacker’s needs:
Get the current session type, text-mode or graphical:
systemctl get-default
Set the current session type to text-mode by disabling gdm autostart:
systemctl set-default multi-user.target
Enable lightdm autostart:
systemctl set-default graphical.target
© 2018 Petr Zak
Theme by Anders Noren — Up ↑