<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Timothy Imanuel</title>
    <description>The latest articles on DEV Community by Timothy Imanuel (@timothy_imanuel_35225c051).</description>
    <link>https://dev.to/timothy_imanuel_35225c051</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3784991%2F026ed4ac-423c-4416-b223-5e321b10911f.png</url>
      <title>DEV Community: Timothy Imanuel</title>
      <link>https://dev.to/timothy_imanuel_35225c051</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/timothy_imanuel_35225c051"/>
    <language>en</language>
    <item>
      <title>Week 7</title>
      <dc:creator>Timothy Imanuel</dc:creator>
      <pubDate>Mon, 13 Apr 2026 11:57:01 +0000</pubDate>
      <link>https://dev.to/timothy_imanuel_35225c051/week-7-310e</link>
      <guid>https://dev.to/timothy_imanuel_35225c051/week-7-310e</guid>
      <description>&lt;h1&gt;
  
  
  Ethical Hacking Week 7: Target Exploitation
&lt;/h1&gt;

&lt;p&gt;This week, we’ve finally moved into the hands-on phase of the course: &lt;strong&gt;Target Exploitation&lt;/strong&gt;. This is where we stop looking for doors and start attacking our target.&lt;/p&gt;

&lt;h2&gt;
  
  
  Metasploit
&lt;/h2&gt;

&lt;p&gt;Our primary focus this week was the &lt;strong&gt;Metasploit Framework&lt;/strong&gt;, the world’s most used penetration testing software. Metasploit is essentially a giant library of pre-made exploits, payloads, and auxiliary tools that simplify the complex process of attacking a target.&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploiting EternalBlue
&lt;/h2&gt;

&lt;p&gt;In our lab, we tackled one of the most famous vulnerabilities in recent history: &lt;strong&gt;EternalBlue&lt;/strong&gt;. This is a flaw in the Windows SMB protocol that allows for unauthenticated Remote Code Execution. &lt;/p&gt;

&lt;p&gt;Here is the standard workflow we used to compromise the target:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search:&lt;/strong&gt; Finding the right module for the job (e.g., &lt;code&gt;search eternalblue&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Select:&lt;/strong&gt; Loading the exploit module (e.g., &lt;code&gt;use exploit/windows/smb/ms17_010_eternalblue&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Configure:&lt;/strong&gt; Setting our parameters, like &lt;code&gt;RHOSTS&lt;/code&gt; (the target’s IP) and the &lt;code&gt;PAYLOAD&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploit:&lt;/strong&gt; Running the command and waiting for the magic to happen.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Meterpreter Shell
&lt;/h2&gt;

&lt;p&gt;Once the exploit was successful, we dropped into a &lt;strong&gt;Meterpreter&lt;/strong&gt; shell. Meterpreter is an advanced, extensible payload that runs in memory to avoid detection. &lt;/p&gt;

&lt;p&gt;Common commands we used to control the target:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;sysinfo&lt;/code&gt;&lt;/strong&gt;: Displays the target's OS and architecture.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;getuid&lt;/code&gt;&lt;/strong&gt;: Shows which user we are running as (usually &lt;code&gt;SYSTEM&lt;/code&gt; after EternalBlue!).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;shell&lt;/code&gt;&lt;/strong&gt;: Drops us into a standard Windows Command Prompt for deeper control.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Rules of Engagement
&lt;/h2&gt;

&lt;p&gt;Even in a lab environment, ethical hacking has strict rules. For our final projects, we have clear boundaries:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;No DoS/DDoS:&lt;/strong&gt; We are here to learn, not to crash the server.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Integrity:&lt;/strong&gt; Never change passwords after gaining access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Persistence:&lt;/strong&gt; Leave a simple text file or post on the target to prove you were there.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Target exploitation is intense and requires precision. Seeing a session open for the first time is an incredible feeling, but it’s a reminder of why security configuration is so important. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devjournal</category>
      <category>infosec</category>
      <category>security</category>
    </item>
    <item>
      <title>Week 6</title>
      <dc:creator>Timothy Imanuel</dc:creator>
      <pubDate>Mon, 13 Apr 2026 11:49:41 +0000</pubDate>
      <link>https://dev.to/timothy_imanuel_35225c051/week-6-57ed</link>
      <guid>https://dev.to/timothy_imanuel_35225c051/week-6-57ed</guid>
      <description>&lt;h1&gt;
  
  
  Ethical Hacking Week 6: Vulnerability Mapping
&lt;/h1&gt;

&lt;p&gt;This week in &lt;em&gt;Ethical Hacking and Penetration Testing&lt;/em&gt;, we go into the critical phase of &lt;strong&gt;Vulnerability Mapping&lt;/strong&gt;. Once we know our target exists and what services it’s running, we need to find the vulnerabilities that they have.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Vulnerability Mapping?
&lt;/h2&gt;

&lt;p&gt;Vulnerability mapping is the process of identifying, classifying, and prioritizing weaknesses in a system. Not all bugs are created equal, and understanding their origin helps us decide how to exploit or fix them.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Three Main Types of Vulnerabilities
&lt;/h2&gt;

&lt;p&gt;We categorize vulnerabilities based on where they come from:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Design Vulnerabilities:&lt;/strong&gt; Flaws in the actual specifications of the software or protocol. These are "broken by design."&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Implementation Vulnerabilities:&lt;/strong&gt; Mistakes made while writing the code, such as poor error handling or logical flaws.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Operational Vulnerabilities:&lt;/strong&gt; Weaknesses caused by improper configuration or poor deployment choices in live environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Local vs. Remote Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Local Vulnerabilities:&lt;/strong&gt; The attacker needs physical access or a local account to trigger the flaw. These are often used for &lt;strong&gt;Privilege Escalation&lt;/strong&gt; (moving from a standard user to an Admin/Root access).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Remote Vulnerabilities:&lt;/strong&gt; The attacker can trigger and exploit the flaw over the network without needing any prior access. These are the "holy grail" for external attackers.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Web Application Auditing
&lt;/h2&gt;

&lt;p&gt;A large part of our lab focused on the unique vulnerabilities found in websites. We looked at how to audit applications for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SQL Injection (SQLi):&lt;/strong&gt; Attacking the database by inserting malicious SQL commands into input fields.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-Site Scripting (XSS):&lt;/strong&gt; Injecting malicious scripts into web pages viewed by other users.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cookie Security:&lt;/strong&gt; Checking for missing security flags like &lt;code&gt;HttpOnly&lt;/code&gt; (prevents JS access) and &lt;code&gt;Secure&lt;/code&gt; (prevents transmission over unencrypted connections).&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Pentester's Toolkit
&lt;/h2&gt;

&lt;p&gt;To find these flaws efficiently, we use a variety of specialized auditing tools:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Burp Suite:&lt;/strong&gt; The industry standard for intercepting and modifying web traffic.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nikto / Nikto2:&lt;/strong&gt; A powerful web server scanner that looks for dangerous files and outdated software.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SQLmap:&lt;/strong&gt; An automated tool that detects and exploits SQL injection flaws.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;W3af:&lt;/strong&gt; A web application attack and audit framework.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Vulnerability mapping turns a list of open ports into a prioritized list of targets. By understanding the taxonomy of these flaws, we can move from simple scanning to high-impact exploitation. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>security</category>
      <category>testing</category>
    </item>
    <item>
      <title>Week 4</title>
      <dc:creator>Timothy Imanuel</dc:creator>
      <pubDate>Wed, 11 Mar 2026 15:23:29 +0000</pubDate>
      <link>https://dev.to/timothy_imanuel_35225c051/week-4-2cf</link>
      <guid>https://dev.to/timothy_imanuel_35225c051/week-4-2cf</guid>
      <description>&lt;h1&gt;
  
  
  Ethical Hacking Week 4: Target Discovery &amp;amp; OS Fingerprinting 🎯🔍
&lt;/h1&gt;

&lt;p&gt;In Week 4 of &lt;em&gt;Ethical Hacking and Penetration Testing&lt;/em&gt;, we officially started mapping out our targets. Before you can exploit a system, you have to find it and figure out exactly what it’s running. This phase is all about &lt;strong&gt;Target Discovery&lt;/strong&gt; and &lt;strong&gt;OS Fingerprinting&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Finding the Target (Discovery)
&lt;/h2&gt;

&lt;p&gt;We looked at the command-line tools used to identify live machines on a network. The classic &lt;code&gt;ping&lt;/code&gt; sweep is great, but we also explored &lt;code&gt;arping&lt;/code&gt;, &lt;code&gt;fping&lt;/code&gt;, &lt;code&gt;hping&lt;/code&gt;, and &lt;code&gt;nbtscan&lt;/code&gt; for mapping out local networks. For modern setups, we even touched on IPv6 discovery tools like &lt;code&gt;alive6&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  OS Fingerprinting (Who are we talking to?)
&lt;/h2&gt;

&lt;p&gt;Once we know a machine is alive, we need to know what operating system it’s running so we can look up vulnerabilities. There are two ways to do this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Active Fingerprinting:&lt;/strong&gt; We send carefully crafted packets to the target and analyze the unique ways its TCP/IP stack responds. Tools like Nmap do this perfectly. It’s fast, but very noisy (firewalls &lt;em&gt;will&lt;/em&gt; log you).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Passive Fingerprinting:&lt;/strong&gt; We quietly sniff the network traffic without sending anything. Tools like &lt;code&gt;p0f&lt;/code&gt; let us figure out the OS just by observing how the target naturally communicates. It's slower, but totally stealthy.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  TCP vs. UDP (The Delivery Methods)
&lt;/h2&gt;

&lt;p&gt;To understand port scanning, you have to understand how data moves across the network.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;TCP (Transmission Control Protocol):&lt;/strong&gt; Connection-oriented and highly reliable. It uses a strict 3-way handshake (SYN ➔ SYN-ACK ➔ ACK) before sending data, and will automatically retransmit lost packets and reorder them at the destination.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UDP (User Datagram Protocol):&lt;/strong&gt; Connectionless and fast. It just fires datagrams at the target without checking if they arrive. It's up to the application (like DNS or SNMP) to handle lost data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We also learned the layout of the port neighborhood:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;0 - 1,023:&lt;/strong&gt; Well-Known Ports&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;1,024 - 49,151:&lt;/strong&gt; Registered Ports&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;49,152 - 65,535:&lt;/strong&gt; Dynamic/Private Ports&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Reading Port Scans like a Pro
&lt;/h2&gt;

&lt;p&gt;When we use a network scanner like &lt;strong&gt;Nmap&lt;/strong&gt;, &lt;strong&gt;Unicornscan&lt;/strong&gt;, or &lt;strong&gt;Amap&lt;/strong&gt;, the target's response tells us exactly what state the port is in.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Decoding a TCP Scan:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gets a &lt;code&gt;SYN+ACK&lt;/code&gt;? The port is open and listening.&lt;/li&gt;
&lt;li&gt;Gets an &lt;code&gt;RST+ACK&lt;/code&gt;? The target explicitly rejected you (Port Closed).&lt;/li&gt;
&lt;li&gt;Gets an &lt;code&gt;ICMP Unreachable&lt;/code&gt; or absolutely nothing? The port is &lt;strong&gt;Filtered&lt;/strong&gt; by a firewall.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Decoding a UDP Scan:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gets a UDP response? The port is open.&lt;/li&gt;
&lt;li&gt;Gets an &lt;code&gt;ICMP Port Unreachable&lt;/code&gt;? The port is closed.&lt;/li&gt;
&lt;li&gt;Gets nothing? The firewall might be dropping it, or the inbound packet was blocked. &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;We are officially mapping networks! Understanding how TCP and UDP respond to our probes is the difference between guessing and knowing. Stay tuned for the next phase. Keep hacking! &lt;/p&gt;

&lt;h1&gt;
  
  
  cybersecurity #infosec #ethicalhacking #nmap #networking
&lt;/h1&gt;

</description>
      <category>cybersecurity</category>
      <category>devjournal</category>
      <category>infosec</category>
      <category>networking</category>
    </item>
    <item>
      <title>Week 5</title>
      <dc:creator>Timothy Imanuel</dc:creator>
      <pubDate>Tue, 10 Mar 2026 14:33:07 +0000</pubDate>
      <link>https://dev.to/timothy_imanuel_35225c051/week-4-kpg</link>
      <guid>https://dev.to/timothy_imanuel_35225c051/week-4-kpg</guid>
      <description>&lt;h1&gt;
  
  
  Ethical Hacking Week 5: The Art of Target Enumeration 🕵️‍♂️🔍
&lt;/h1&gt;

&lt;p&gt;This week in &lt;em&gt;Ethical Hacking and Penetration Testing&lt;/em&gt;, we moved into &lt;strong&gt;Enumeration&lt;/strong&gt;—the intrusive phase where we actively communicate with targets to extract actionable intelligence like network shares, usernames, and passwords.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Core of Windows Enumeration: NetBIOS
&lt;/h2&gt;

&lt;p&gt;Because many attacks on older Windows systems still work today, enumerating Microsoft targets is a major focus. To do this, you must understand &lt;strong&gt;NetBIOS&lt;/strong&gt; (Network Basic Input Output System).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;NetBIOS Names:&lt;/strong&gt; These are limited to 16 characters and must be unique on the network. The final character is a hex suffix that identifies the specific service running.

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;&amp;lt;00&amp;gt;&lt;/code&gt;: Workstation service&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;&amp;lt;20&amp;gt;&lt;/code&gt;: Server service (sharing enabled)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;&amp;lt;1C&amp;gt;&lt;/code&gt;: Domain Controller or IIS&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Null Sessions:&lt;/strong&gt; An infamous, unauthenticated connection to a Windows system that doesn't require a username or password. Surprisingly, it still exists on systems like Windows XP!&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Enumeration Toolkit 🧰
&lt;/h2&gt;

&lt;p&gt;We covered a mix of command-line and GUI tools used to pull this data directly from targets:&lt;/p&gt;

&lt;h3&gt;
  
  
  Command-Line Essentials
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;nbtscan&lt;/code&gt;&lt;/strong&gt;: Scans a range of IP addresses for NetBIOS information.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;nbtstat&lt;/code&gt;&lt;/strong&gt;: Displays the NetBIOS table of a remote machine.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;net view&lt;/code&gt;&lt;/strong&gt;: Checks for shared resources on a specific network host.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;net use&lt;/code&gt;&lt;/strong&gt;: Connects to those shared folders or files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  GUI &amp;amp; Advanced Tools
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;NetScan Tools Pro:&lt;/strong&gt; Graphically maps NetBIOS services and verifies access to shared resources.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DumpSec:&lt;/strong&gt; Connects to a server to "dump" detailed permissions, user tables, policies, and registry details.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hyena:&lt;/strong&gt; A management tool that visually maps shares, user logins, and terminal services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nessus Client:&lt;/strong&gt; A heavy hitter that identifies OS versions, open shares, and even firewall vulnerabilities across large networks.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Beyond Windows
&lt;/h3&gt;

&lt;p&gt;While NetBIOS is the star of the show for Windows, we also briefly explored service enumeration tools for other protocols, including &lt;strong&gt;Amap&lt;/strong&gt;, &lt;strong&gt;Httprint&lt;/strong&gt;, &lt;strong&gt;Httsquash&lt;/strong&gt;, and &lt;strong&gt;Ike-scan&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;Enumeration transitions us from passively "looking" at a target to actively "touching" it, giving us the exact keys we need for exploitation. Next week, we dive into &lt;strong&gt;Vulnerability Mapping&lt;/strong&gt;!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devjournal</category>
      <category>infosec</category>
      <category>networking</category>
    </item>
    <item>
      <title>Week 3</title>
      <dc:creator>Timothy Imanuel</dc:creator>
      <pubDate>Sat, 28 Feb 2026 03:27:58 +0000</pubDate>
      <link>https://dev.to/timothy_imanuel_35225c051/week-3-3e1a</link>
      <guid>https://dev.to/timothy_imanuel_35225c051/week-3-3e1a</guid>
      <description>&lt;h1&gt;
  
  
  Week 03: Information Gathering and OSINT Tools
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Disclaimer:&lt;/strong&gt; The tools and techniques discussed in this blog are strictly for educational purposes. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This week in our Ethical Hacking and Penetration Testing class, we moved past the rules of engagement and into the actual **reconnaissance **phase. The focus was on utilizing search engines and Open Source Intelligence (OSINT) tools within Kali Linux to gather information about a target. &lt;/p&gt;

&lt;p&gt;We covered three main tools that automate the process of scraping and connecting public data.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. TheHarvester
&lt;/h2&gt;

&lt;p&gt;The first tool is TheHarvester. Its primary function is to hunt down email accounts, usernames, and hostnames/subdomains associated with a specific target domain. &lt;/p&gt;

&lt;p&gt;Instead of manually searching, TheHarvester automates queries across multiple search engines and databases. It supports scraping from sources like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Google and Bing&lt;/li&gt;
&lt;li&gt;LinkedIn and Google Profiles&lt;/li&gt;
&lt;li&gt;PGP servers and Shodan&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. Metagoofil
&lt;/h2&gt;

&lt;p&gt;While TheHarvester looks for accounts and domains, Metagoofil is designed specifically to extract metadata from public documents. &lt;/p&gt;

&lt;p&gt;It works through an automated pipeline:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;It uses Google to search the target domain for specific file types (like PDFs or Word docs).&lt;/li&gt;
&lt;li&gt;It downloads all the discovered documents to your local disk.&lt;/li&gt;
&lt;li&gt;It extracts the hidden metadata and generates an HTML report.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This is highly effective because metadata often leaks sensitive internal information, such as employee usernames, the software versions used to create the files, and internal server or machine names.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Maltego
&lt;/h2&gt;

&lt;p&gt;The most visually complex tool we looked at is Maltego. It is an open-source intelligence and forensics application that maps out how different pieces of data are connected. &lt;/p&gt;

&lt;p&gt;Instead of just giving you a list of data, Maltego builds a relationship graph. We use different "Palettes" depending on what we are investigating:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Infrastructure Reconnaissance:&lt;/strong&gt; You can map out the technical footprint of a target by finding the relationships between domains, DNS names, IPv4 addresses, and net blocks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Personal Reconnaissance:&lt;/strong&gt; You can find relationships between people, linking them to their email addresses, phone numbers, mutual friends, companies, and social media affiliations like Twitter and Facebook.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Information gathering is about building a comprehensive profile of the target's attack surface before launching any exploits. We will likely use the data collected from these tools in the later stages of our semester project.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devjournal</category>
      <category>infosec</category>
      <category>tooling</category>
    </item>
    <item>
      <title>Week 2</title>
      <dc:creator>Timothy Imanuel</dc:creator>
      <pubDate>Sat, 28 Feb 2026 03:20:04 +0000</pubDate>
      <link>https://dev.to/timothy_imanuel_35225c051/week-2-31fh</link>
      <guid>https://dev.to/timothy_imanuel_35225c051/week-2-31fh</guid>
      <description>&lt;h1&gt;
  
  
  Week 02: Testing Methodologies and the Rules of Engagement
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Disclaimer:&lt;/strong&gt; The tools and techniques discussed in this blog are strictly for educational purposes. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This week in the Ethical Hacking and Penetration Testing class, we focused heavily on the theory and legalities of penetration testing. Before we start actively breaking into systems, we need to understand the structural boundaries and the legalities involved&lt;/p&gt;

&lt;h2&gt;
  
  
  The Types of Hackers
&lt;/h2&gt;

&lt;p&gt;The industry separates security personnel and attackers into a few distinct buckets:&lt;br&gt;
&lt;strong&gt;Ethical Hackers:&lt;/strong&gt; break into systems with permission to find the weak links and report them so the organization can patch them.&lt;br&gt;
&lt;strong&gt;Hackers &amp;amp; Crackers:&lt;/strong&gt; These are individuals accessing systems without authorization, often to steal or destroy data, which is a fast track to prison.&lt;br&gt;
&lt;strong&gt;Script Kiddies:&lt;/strong&gt; Young, inexperienced amateurs who just copy and paste scripts and techniques without actually understanding the underlying cod.&lt;/p&gt;

&lt;h2&gt;
  
  
  Penetration Testing Models
&lt;/h2&gt;

&lt;p&gt;When executing a real-world test, your approach depends entirely on how much information the client gives you upfront.&lt;br&gt;
&lt;strong&gt;White Box:&lt;/strong&gt; You are given the full network topology and have authorization to interview the IT staff.&lt;br&gt;
&lt;strong&gt;Black Box:&lt;/strong&gt; You get zero details, and the internal company staff doesn't even know the test is happening. [cite_start]You have to find and map everything yourself.&lt;br&gt;
&lt;strong&gt;Gray Box:&lt;/strong&gt; A hybrid approach where the client provides you with partial information to start the engagement.&lt;/p&gt;

&lt;h2&gt;
  
  
  Red Team vs. Blue Team
&lt;/h2&gt;

&lt;p&gt;Security operations are usually split into two opposing sides.&lt;br&gt;
&lt;strong&gt;Red Team:&lt;/strong&gt; Acts as the attackers, performing tests without the knowledge of the IT staff, usually to reveal system defense capabilities.&lt;br&gt;
&lt;strong&gt;Blue Team:&lt;/strong&gt; The internal team that defends the system. [cite_start]They are the opposing side of the red team.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Legal Reality (UU ITE)
&lt;/h2&gt;

&lt;p&gt;This is the most critical takeaway. [cite_start]Accessing a computer without explicit permission is illegal. [cite_start]Here in Indonesia, we operate under the UU ITE (Information and Electronic Transactions Law).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Under Pasal 31 (Indoneisan Law), intercepting or wiretapping electronic information or documents in a system you do not own is a crime.&lt;/li&gt;
&lt;li&gt;Even seemingly harmless reconnaissance might be viewed as a violation depending on your ISP's Acceptable Use Policy.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The golden rule of penetration testing: Using a contract is just good business, and you should have an attorney read over your contract before signing it.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devjournal</category>
      <category>infosec</category>
      <category>testing</category>
    </item>
    <item>
      <title>Week 1</title>
      <dc:creator>Timothy Imanuel</dc:creator>
      <pubDate>Sun, 22 Feb 2026 12:14:55 +0000</pubDate>
      <link>https://dev.to/timothy_imanuel_35225c051/week-1-2egp</link>
      <guid>https://dev.to/timothy_imanuel_35225c051/week-1-2egp</guid>
      <description>&lt;h1&gt;
  
  
  Week 01: Course Setup and Kali Linux Installation
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Disclaimer:&lt;/strong&gt; The tools and techniques discussed in this blog are strictly for educational purposes. Do not use this information for illegal activities. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This week marks the start of the Ethical Hacking and Penetration Testing course at campus. The goal of this class isn't just to teach us how to run automated scripts (eg: becoming a script kiddie), but to actually understand how to find vulnerabilities, escalate privileges, and cover our tracks.&lt;/p&gt;

&lt;p&gt;Before getting into the technical stuff, we went over the ground rules for the semester.&lt;/p&gt;

&lt;h2&gt;
  
  
  Class Rules &amp;amp; Expectations
&lt;/h2&gt;

&lt;p&gt;The administration made a few things very clear on day one:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Collaboration vs. Cheating:&lt;/strong&gt; Working together is encouraged, but outright copying is a hard no. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attendance:&lt;/strong&gt; Arriving more than 30 minutes late means you are locked out of the class and marked absent.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Main Project
&lt;/h2&gt;

&lt;p&gt;The core of this course is a hands-on penetration testing project that runs throughout the semester.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Targets:&lt;/strong&gt; We will be testing web apps, client/server applications, and a specific cloud environment prepared for the class. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hard Rule:&lt;/strong&gt; DDoS attacks against the targets are strictly forbidden.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reporting:&lt;/strong&gt; Everything we do has to be documented. This blog serves as my ongoing journal for the project. At the end of the course, we have to submit a final Penetration Testing Report and present our findings.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Lab Setup: Kali Linux
&lt;/h2&gt;

&lt;p&gt;You cannot do penetration testing safely on your main host OS. You need an isolated virtual machine. &lt;/p&gt;

&lt;p&gt;For our lab environment, we are using VirtualBox (or VMware) to run Kali Linux. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimum VM Requirements:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;RAM:&lt;/strong&gt; 4 GB&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Storage:&lt;/strong&gt; 40 GB (Running this on an SSD is highly recommended so it doesn't lag).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CPU:&lt;/strong&gt; 2 vCPUs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once the VM is set up and running, the baseline environment is ready.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devjournal</category>
      <category>learning</category>
      <category>linux</category>
    </item>
  </channel>
</rss>
