Hacking cycle: Enumeration phase, Vulnerability Identification, Vulnerability Exploitation, Limited code Execution, Privilege escalation.
Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments
Kali Linux tools and software used: Nmap, Dirb, BurpSuite, Sqlmap, ftp, ssh, John the ripper.