Ethical Hacker 2
Description
I present you an advanced video in the PenTest sector. If you see yourself as a future Information Security professional, my video will show you a development of a PenTest in a controlled laboratory. Knowledge is not a crime!
With this video it will be possible to observe the operation of each command, how it acts and how it shows the responses.
What will you get?
I decided to share a knowledge I have. My intention is to show how a PenTest is made and serves as a means of protection, such as using a strong password.
I will deliver the source files of the project within the stipulated time
The video will show you how to execute the commands in the terminal. For those working in the area or PenTest programming and are still beginners you will understand how it is done the process and the care they should have.
The video teaches how to execute the commands in the terminal. After that the actions will be performed. I present each step that must be done, simple and practical. With just one mobile application you can do the tasks and have the potential to expand your knowledge using other commands for certain purposes.