excellent just excellent way to teaching mam. i was a very informative video and easy to understand. Today i came across your channel it is really amazing mam. please make videos on networking protocols, network components (router, switch, firewalls and the working), OSI model and possible attacks on each layer of OSI model and ways to mitigate those attacks. also try to bring videos on the topics like Windows registry, IP addressing, shell scripting and also cover the video on different attacks like DOS, DDOS, mam in the middle , ARP Poisoning, i think finally i have landed on the right channel will be waiting for your videos mam.........
Nice information video Mam👌, Mam As requested many Times , place place make video on Threat Hunting interview & please include scenarios based & some case study for clearing the Real interview, Thanks in Advance & Have a Great year ahead 🙂
Reconnaissance is mostly done silently (secretly learning about a target). Scanning is active, like checking doors (network ports) to find weak spots by seeing which ones are open. Enumeration is like looking inside those open doors, discovering who's there (user accounts) and what's in each room (system details).