Cover the Basics: Part 1
January 7, 2018
Audience
● Beginners in OffSec
● Students
Objective
Objective of this session is to give a starting point to people like me who want
to explore the world of Offensive Security.
This session is not for people who just want to learn hacking (aka Black Hat
hacking)
Topics
● Different types of hacking
● Concepts of Ethical Hacking
● Why we should not skip the basic
○ phased approach to hacking
● Prerequisites to be an effective
hacker
○ not just script kiddie
What is hacking?
Offensive Security basics  part 1
Different types of hacking
Types
● Script Kiddie
● White Hat
● Black Hat
● Gray Hat
● Green Hat
● Red Hat
● Blue Hat
Script Kiddie
Script Kiddies normally don’t care about hacking. They copy code and
use it for. Script Kiddies will never hack for themselves; they’ll just
download overused software (ex: Metasploit) and watch a YouTube
video on how to use it. A common Script Kiddie attack is DoSing or
DDoSing (Denial of Service and Distributed Denial of Service), in which
they flood an IP with so much information it collapses under the strain.
White Hat
Also known as ethical hackers, White Hat hackers are the good guys of
the hacker world. They’ll help you remove a virus or PenTest a
company. Find vulnerable spots in your infrastructure and help fix them.
The most popular certification white hat hackers obtain is the OSCP
(Offensive Security Certified Professional).
Black Hat
Also known as crackers, these are the men and women you hear about
in the news. They find banks or other companies with weak security
and steal money or credit card information. The surprising truth about
their methods of attack is that they often use common hacking
practices they learned early on.
Gray Hat
Nothing is ever just black or white; the same is true in the world of
hacking. Gray Hat hackers don’t steal money or information (although,
sometimes they deface a website or two), yet they don’t help people for
good (but, they could if they wanted to). These hackers comprise most
of the hacking world, even though Black Hat hackers garner most (if not
all) of the media’s attention.
Green Hat
These are the hacker “n00bz,” but unlike Script Kiddies, they care
about hacking and strive to become full-blown hackers. They’re often
flamed by the hacker community for asking many basic questions.
When their questions are answered, they’ll listen with the intent and
curiosity of a child listening to family stories.
Red Hat
These are the vigilantes of the hacker world. They’re like White Hats in
that they halt Black Hats, but these folks are downright SCARY to those
who have ever tried so much as PenTest. Instead of reporting the
malicious hacker, they shut him/her down by uploading viruses, DoSing
and accessing his/her computer to destroy it from the inside out. They
leverage multiple aggressive methods that might force a cracker to
need a new computer.
Blue Hat
If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue
Hat hackers will seek vengeance on those who’ve them angry. Most
Blue Hats are n00bz, but like the Script Kiddies, they have no desire to
learn.
Concepts of Ethical Hacking
Concepts of Ethical Hacking
● Phase of Pentesting
● Footprinting
● Scanning
● Enumeration
● System Hacking
● Trojans
● Viruses and Worms
● Sniffing Traffic
● Social engineering
● Denial of service
Phase of Pentesting
PenTest, like forensics, is almost as much an art as it is a science –
you can only be taught so far, technical techniques and tools are all
very well, but you really need a mind that can think sideways and
approach a task from as many angles as possible.
Footprinting
Tools and tricks to get the information about the computer, IP and mac
address, related user and system.
Scanning
Before starting the pentesting, pentester must have some information
about network and system. So pentester scans the entire network with
some tool like Nmap, Zenmap, ping and hping etc.
Enumeration
During the enumeration phase, possible entry points into the tested
systems are identified. The information collected during the
reconnaissance phase is put to use.
System Hacking
System hacking is getting into system without credentials and not only
bypass the credentials but also you can work in system as root user by
privilege escalation.
Trojans
It is a generally non-self-replicating type of malware program containing
malicious code. A Trojan often acts as a backdoor, contacting a
controller which can then have unauthorized access to the affected
computer. While Trojans and backdoors are not easily detectable by
themselves, computers may appear to run slower due to heavy
processor or network usage.
Viruses and Worms
A computer virus attaches itself to a program or file enabling it to
spread from one computer to another, leaving infections. A worm is its
capability to replicate itself on your system, so rather than your
computer sending out a single worm, it could send out hundreds or
thousands of copies of itself, creating a huge devastating effect.
Sniffing Traffic
It is a program that monitors and analyzes network traffic, detecting and
finding problems. Various technique and tool is used for sniffing like kali
linux MITM attack, tshark, ZAP, urlsnarf etc.
Social engineering
In this technique, ethical hacker create the phishing page of website to
obtain credential of users.
Denial of service
A DoS attack generally consists of efforts to temporarily interrupt or
suspend or down the services of a host connected to the Internet.
Different phases of hacking
Phases
● Phase 1 | Reconnaissance
● Phase 2 | Scanning
● Phase 3 | Gaining Access
● Phase 4 | Maintaining Access
● Phase 5 | Covering Tracks / Reporting
Phase 1 | Reconnaissance
Reconnaissance is the act of gathering preliminary data or intelligence
on your target. The data is gathered in order to better plan for your
attack. Reconnaissance can be performed actively (meaning that you
are directly touching the target) or passively (meaning that your recon
is being performed through an intermediary).
Phase 2 | Scanning
The phase of scanning requires the application of technical tools to
gather further intelligence on your target, but in this case, the intel
being sought is more commonly about the systems that they have in
place. A good example would be the use of a vulnerability scanner on a
target network (ex: nessus, nmap, etc).
Phase 3 | Gaining Access
Phase 3 gaining access requires taking control of one or more network
devices in order to either extract data from the target, or to use that
device to then launch attacks on other targets. This can be done using
tools or manually by exploiting vulnerabilities of tools discovered in
scanning phase.
Phase 4 | Maintaining Access
Maintaining access requires taking the steps involved in being able to
be persistently within the target environment in order to gather as much
data as possible. The attacker must remain stealthy in this phase, so as
to not get caught while using the host environment.
Phase 5 | Covering Tracks / Reporting
The final phase is different for different type of hackers. For white hat
hackers reporting is crucial, as that will help in defencive security later.
For black hat hackers covering tracks is required and simply means
that the attacker must take the steps necessary to remove all
semblance of detection.
Phase Important | Documentation
One important aspect of information gathering is documentation. Most
people don't like paperwork, but it's a requirement that can't be ignored.
The best way to get off to a good start is to develop a systematic
method to profile a target and record the results. Create a matrix with
fields to record domain name, IP address, DNS servers, employee
information, email addresses, IP address range, open ports, and
banner details. These details will help you in every phase of hacking.
Prerequisites to be an effective hacker
The Fundamental Skills
● Basic Computer Skills
● Networking Skills
● Linux Skills
● Wireshark / Tcpdump (sniffing)
● Virtualization / Cloud
● Security Concepts & Technologies
● Wireless Technologies
The Intermediate Skills
● Scripting
● Database Skills
● Web Applications
● Forensics
● Advanced TCP/IP
● Cryptography
● Reverse Engineering
The Intangible Skills
● Think Creatively
● Problem-Solving Skills
● Persistence
© Harpreet Singh Wadhwa
Harpreet Singh Wadhwa
https://www.meetup.com/offsecblr
https://twitter.com/wharpreet
Mailto: saviour@offsecblr.com

More Related Content

PPTX
Introduction to Offensive Security.pptx
PDF
Offensive OSINT
PDF
Cyber Threat Intelligence
PPTX
Brute force-attack presentation
ODP
Web Application Firewall
PPTX
Footprinting and reconnaissance
PPTX
Session Hijacking ppt
PDF
OSINT- Leveraging data into intelligence
Introduction to Offensive Security.pptx
Offensive OSINT
Cyber Threat Intelligence
Brute force-attack presentation
Web Application Firewall
Footprinting and reconnaissance
Session Hijacking ppt
OSINT- Leveraging data into intelligence

What's hot (20)

PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Cyber espionage nation state-apt_attacks_on_the_rise
PDF
Hunting for Credentials Dumping in Windows Environment
PDF
Open Source Intelligence (OSINT)
PDF
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
PDF
PPTX
Cyber Kill Chain.pptx
PDF
How to Hunt for Lateral Movement on Your Network
PDF
Introduction to MITRE ATT&CK
PPT
Honeypot
PPTX
Kheirkhabarov24052017_phdays7
PPTX
Linux privilege escalation 101
PDF
Threat Hunting
PPT
Owasp osint presentation - by adam nurudini
PPT
Port scanning
PPTX
Introduction To Exploitation & Metasploit
PPT
Ethical Hacking Powerpoint
PPTX
Osint {open source intelligence }
PDF
1. introduction to cyber security
Ethical Hacking n VAPT presentation by Suvrat jain
Overview of the Cyber Kill Chain [TM]
Cyber espionage nation state-apt_attacks_on_the_rise
Hunting for Credentials Dumping in Windows Environment
Open Source Intelligence (OSINT)
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
Cyber Kill Chain.pptx
How to Hunt for Lateral Movement on Your Network
Introduction to MITRE ATT&CK
Honeypot
Kheirkhabarov24052017_phdays7
Linux privilege escalation 101
Threat Hunting
Owasp osint presentation - by adam nurudini
Port scanning
Introduction To Exploitation & Metasploit
Ethical Hacking Powerpoint
Osint {open source intelligence }
1. introduction to cyber security
Ad

Similar to Offensive Security basics part 1 (20)

PPTX
Introduction to ethical hacking
PPTX
Ethical Hacking
PPT
Unit-2 ICS.ppt
PPTX
Introduction ethical hacking
PPTX
Ethical Hacking Overview
DOCX
Ethical hacking
PPT
Introduction To Ethical Hacking
PPT
Hacking Presentation
PPTX
Ethical-Hacking-ppt.pptx
ODP
Ethical hacking ppt
PPT
Introduction TO Ethical Hacking
PPTX
Cse ethical hacking ppt
PPTX
CSSE-Ethical-Hacking-ppt.pptx
PDF
Paper id 311201535
PPTX
Cyber Crime And Security
PDF
Master Ethical Hacking Basics Like a Pro
PPTX
CSE-Ethical-Hacking-ppt.pptx
PPTX
Ethical hacking and cyber security intro
PPTX
How to hack or what is ethical hacking
Introduction to ethical hacking
Ethical Hacking
Unit-2 ICS.ppt
Introduction ethical hacking
Ethical Hacking Overview
Ethical hacking
Introduction To Ethical Hacking
Hacking Presentation
Ethical-Hacking-ppt.pptx
Ethical hacking ppt
Introduction TO Ethical Hacking
Cse ethical hacking ppt
CSSE-Ethical-Hacking-ppt.pptx
Paper id 311201535
Cyber Crime And Security
Master Ethical Hacking Basics Like a Pro
CSE-Ethical-Hacking-ppt.pptx
Ethical hacking and cyber security intro
How to hack or what is ethical hacking
Ad

Recently uploaded (20)

PDF
IDM Crack Activation Key 2025 Free Download
PPTX
SQL introduction and commands, SQL joining
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
PPTX
SIH2024_IDEA_dy_dx_deepfakedetection.pptx
PPTX
HackYourBrain__UtrechtJUG__11092025.pptx
PPTX
Beige and Black Minimalist Project Deck Presentation (1).pptx
PDF
OpenColorIO Virtual Town Hall - August 2025
PDF
solman-7.0-ehp1-sp21-incident-management
PPTX
Presentation - Summer Internship at Samatrix.io_template_2.pptx
PDF
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
PDF
DOWNLOAD—IOBit Uninstaller Pro Crack Download Free
PDF
4K Video Downloader Crack + License Key 2025
PPTX
AI Tools Revolutionizing Software Development Workflows
PDF
KidsTale AI Review - Create Magical Kids’ Story Videos in 2 Minutes.pdf
PPTX
Advanced Heap Dump Analysis Techniques Webinar Deck
PDF
IT Advisory Services | Alphavima Technologies – Microsoft Partner
PPTX
Relevance Tuning with Genetic Algorithms
PDF
How to Write Automated Test Scripts Using Selenium.pdf
PDF
Module 1 - Introduction to Generative AI.pdf
PDF
MaterialX Virtual Town Hall - August 2025
IDM Crack Activation Key 2025 Free Download
SQL introduction and commands, SQL joining
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
SIH2024_IDEA_dy_dx_deepfakedetection.pptx
HackYourBrain__UtrechtJUG__11092025.pptx
Beige and Black Minimalist Project Deck Presentation (1).pptx
OpenColorIO Virtual Town Hall - August 2025
solman-7.0-ehp1-sp21-incident-management
Presentation - Summer Internship at Samatrix.io_template_2.pptx
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
DOWNLOAD—IOBit Uninstaller Pro Crack Download Free
4K Video Downloader Crack + License Key 2025
AI Tools Revolutionizing Software Development Workflows
KidsTale AI Review - Create Magical Kids’ Story Videos in 2 Minutes.pdf
Advanced Heap Dump Analysis Techniques Webinar Deck
IT Advisory Services | Alphavima Technologies – Microsoft Partner
Relevance Tuning with Genetic Algorithms
How to Write Automated Test Scripts Using Selenium.pdf
Module 1 - Introduction to Generative AI.pdf
MaterialX Virtual Town Hall - August 2025

Offensive Security basics part 1

  • 1. Cover the Basics: Part 1 January 7, 2018
  • 2. Audience ● Beginners in OffSec ● Students
  • 3. Objective Objective of this session is to give a starting point to people like me who want to explore the world of Offensive Security. This session is not for people who just want to learn hacking (aka Black Hat hacking)
  • 4. Topics ● Different types of hacking ● Concepts of Ethical Hacking ● Why we should not skip the basic ○ phased approach to hacking ● Prerequisites to be an effective hacker ○ not just script kiddie
  • 8. Types ● Script Kiddie ● White Hat ● Black Hat ● Gray Hat ● Green Hat ● Red Hat ● Blue Hat
  • 9. Script Kiddie Script Kiddies normally don’t care about hacking. They copy code and use it for. Script Kiddies will never hack for themselves; they’ll just download overused software (ex: Metasploit) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain.
  • 10. White Hat Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Find vulnerable spots in your infrastructure and help fix them. The most popular certification white hat hackers obtain is the OSCP (Offensive Security Certified Professional).
  • 11. Black Hat Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.
  • 12. Gray Hat Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.
  • 13. Green Hat These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.
  • 14. Red Hat These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.
  • 15. Blue Hat If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.
  • 17. Concepts of Ethical Hacking ● Phase of Pentesting ● Footprinting ● Scanning ● Enumeration ● System Hacking ● Trojans ● Viruses and Worms ● Sniffing Traffic ● Social engineering ● Denial of service
  • 18. Phase of Pentesting PenTest, like forensics, is almost as much an art as it is a science – you can only be taught so far, technical techniques and tools are all very well, but you really need a mind that can think sideways and approach a task from as many angles as possible.
  • 19. Footprinting Tools and tricks to get the information about the computer, IP and mac address, related user and system.
  • 20. Scanning Before starting the pentesting, pentester must have some information about network and system. So pentester scans the entire network with some tool like Nmap, Zenmap, ping and hping etc.
  • 21. Enumeration During the enumeration phase, possible entry points into the tested systems are identified. The information collected during the reconnaissance phase is put to use.
  • 22. System Hacking System hacking is getting into system without credentials and not only bypass the credentials but also you can work in system as root user by privilege escalation.
  • 23. Trojans It is a generally non-self-replicating type of malware program containing malicious code. A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage.
  • 24. Viruses and Worms A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections. A worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.
  • 25. Sniffing Traffic It is a program that monitors and analyzes network traffic, detecting and finding problems. Various technique and tool is used for sniffing like kali linux MITM attack, tshark, ZAP, urlsnarf etc.
  • 26. Social engineering In this technique, ethical hacker create the phishing page of website to obtain credential of users.
  • 27. Denial of service A DoS attack generally consists of efforts to temporarily interrupt or suspend or down the services of a host connected to the Internet.
  • 29. Phases ● Phase 1 | Reconnaissance ● Phase 2 | Scanning ● Phase 3 | Gaining Access ● Phase 4 | Maintaining Access ● Phase 5 | Covering Tracks / Reporting
  • 30. Phase 1 | Reconnaissance Reconnaissance is the act of gathering preliminary data or intelligence on your target. The data is gathered in order to better plan for your attack. Reconnaissance can be performed actively (meaning that you are directly touching the target) or passively (meaning that your recon is being performed through an intermediary).
  • 31. Phase 2 | Scanning The phase of scanning requires the application of technical tools to gather further intelligence on your target, but in this case, the intel being sought is more commonly about the systems that they have in place. A good example would be the use of a vulnerability scanner on a target network (ex: nessus, nmap, etc).
  • 32. Phase 3 | Gaining Access Phase 3 gaining access requires taking control of one or more network devices in order to either extract data from the target, or to use that device to then launch attacks on other targets. This can be done using tools or manually by exploiting vulnerabilities of tools discovered in scanning phase.
  • 33. Phase 4 | Maintaining Access Maintaining access requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible. The attacker must remain stealthy in this phase, so as to not get caught while using the host environment.
  • 34. Phase 5 | Covering Tracks / Reporting The final phase is different for different type of hackers. For white hat hackers reporting is crucial, as that will help in defencive security later. For black hat hackers covering tracks is required and simply means that the attacker must take the steps necessary to remove all semblance of detection.
  • 35. Phase Important | Documentation One important aspect of information gathering is documentation. Most people don't like paperwork, but it's a requirement that can't be ignored. The best way to get off to a good start is to develop a systematic method to profile a target and record the results. Create a matrix with fields to record domain name, IP address, DNS servers, employee information, email addresses, IP address range, open ports, and banner details. These details will help you in every phase of hacking.
  • 36. Prerequisites to be an effective hacker
  • 37. The Fundamental Skills ● Basic Computer Skills ● Networking Skills ● Linux Skills ● Wireshark / Tcpdump (sniffing) ● Virtualization / Cloud ● Security Concepts & Technologies ● Wireless Technologies
  • 38. The Intermediate Skills ● Scripting ● Database Skills ● Web Applications ● Forensics ● Advanced TCP/IP ● Cryptography ● Reverse Engineering The Intangible Skills ● Think Creatively ● Problem-Solving Skills ● Persistence
  • 39. © Harpreet Singh Wadhwa Harpreet Singh Wadhwa https://www.meetup.com/offsecblr https://twitter.com/wharpreet Mailto: [email protected]