Posts

Showing posts from February, 2026

Week 3 - Deep Dive into Footprinting and Burp Suite

As required by the course guidelines, any tools, techniques, and tutorials shared on this blog are strictly for educational purposes. I am not responsible for any misuse of the information or tools demonstrated here. Week 3 of Ethical Hacking and Penetration Testing got significantly more technical. We moved past the high-level theory of Target Scoping and Information Gathering and started getting our hands dirty with actual footprinting tools in our Kali Linux VMs. Here is a rundown of the practical techniques we covered. Target Scoping Realities Before launching into the tools, we discussed the logistics of scoping. It is not just about picking a target; it involves defining business objectives, establishing strict test boundaries, and setting up project management schedules. You need to know exactly what is allowed (e.g., black-box vs. white-box testing) and what is strictly off-limits before you start. Intercepting Traffic with Burp Suite One of the core practical skills this week ...

Week 2 - Target Scoping and Information Gathering

Here is a draft for your Week 2 blog post, keeping that same grounded, realistic student perspective. Just a reminder as required by the course: any tools, techniques, and concepts shared on this blog are strictly for educational purposes. I am not responsible for any misuse of the information or tools discussed here. Week 2 of Ethical Hacking is here, and my Kali Linux VM is finally set up and running smoothly. This week, we moved past the legal definitions and jumped right into the first two steps of the Kali Linux Testing Methodology: Target Scoping and Information Gathering. To prepare, our reading assignment was chapters 3 and 4 from Kali Linux: Assuring Security By Penetration Testing (KLASPT). Here are my notes on the early phases of a penetration test. Step 1: Target Scoping Before you even think about touching a network or firing up a terminal, you have to define the scope of the test. This is arguably the most important part from a legal and professional standpoint. Scoping ...

Week 1 - Intro to Ethical Hacking and Building the Lab

As required by the course guidelines, any tools, techniques, and tutorials shared on this blog are strictly for educational purposes . I am not responsible for any misuse of the information or tools demonstrated here. We just had our first session for the Ethical Hacking & Pen Test course at BINUS University International . Our lecturer, Pak Kalpin Erlangga Silaen , laid out the syllabus, the ground rules, and what we will be covering this semester. The main objective of the course is straightforward: get hands-on experience with hacking tools and penetration testing techniques . We will be walking through the complete ethical hacking cycle, which includes information gathering, enumeration, system hacking, privilege escalation, and covering tracks . Our main textbook for the semester is Mastering Kali Linux by Noah Hardy . Course Policies and Ethics One thing made very clear today is that professional ethics are non-negotiable in this field. We are actually expected to sign an a...