Current Image

Hands-On Way to Learn Penetration Testing!

A structured approach to get started:


1️⃣ Reconnaissance & Information Gathering 🔍

  • Use Whois lookup: whois radblok.co.za
  • Scan subdomains: subfinder -d radblok.co.za
  • Find exposed files: waybackurls radblok.co.za
  • Google Dorking: site:radblok.co.za filetype:pdf

2️⃣ Scanning & Enumeration 🕵️‍♂️

  • Scan for open ports: nmap -A radblok.co.za
  • Check web vulnerabilities: nikto -h radblok.co.za
  • Run a security scan: wpscan --url radblok.co.za (if using WordPress)

3️⃣ Exploitation & Vulnerability Testing 🚨

  • Test for SQL Injection: sqlmap -u "http://radblok.co.za/?id=1" --dbs
  • Scan for XSS: xsstrike -u "http://radblok.co.za"
  • Check for misconfigurations: testssl.sh radblok.co.za

4️⃣ Fix & Harden Security 🔒

  • Review findings and patch vulnerabilities in your GitHub repository.
  • Secure headers with Content-Security-Policy and X-Frame-Options.
  • Implement WAF (Web Application Firewall) to block attacks.

Would you like help setting up a pentesting lab with tools like Burp Suite and OWASP ZAP for deeper analysis? 🚀