Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Vulnerabilities assessment and testing

Rating
-
Sold
-
Pages
9
Uploaded on
03-03-2024
Written in
2023/2024

This book provides an invaluable knowledge to students in the technology disciplines and computing field about the concept of vulnerability assessment, testing, network scanning, how they are done as well as terminologies within the scope.

Show more Read less
Institution
Course

Content preview

CYB 403-LECTURE NOTE 2
5 PHASES IN PEN-TESTING




1. INFORMATION GATHERING
Information Gathering is the process of collecting various types of info against the
targeted device or victim or organization. This is the first and foremost step and it is
absolutely necessary to carry out
this vital step. The more useful information, the better, as an ethical hacker you'd be able
to devise a more tailored approach to breach the security in the most efficient manner.

Information gathering can be classified into two types:
i. Active reconnaissance;
ii. Passive reconnaissance




 Footprinting is the technique to collect as much information as possible about the
targeted network/victim/system. The first step in attacking any network is to figure
out what to attack, to develop a "footprint" of the target network.

, Following are some branches of footprinting a learner should know before
gathering information
 Open source footprinting
 Network-based footprinting
 DNS interrogation

Open source footprinting
This type of footprinting is the safest, and hackers can do this without the worry
about breaking laws. This is publicly available information. Examples of this type
include: finding someone's email address, phone number, scanning IP through
automated tools, search for their age, DOB, house address, etc.

Most companies provide information about their companies on their official website
without realizing that hackers can benefit from that information provided by them.

Network-based footprinting
The basic goal is to learn more about the network. There is a lot to discover,
including, but not limited to, the following:
a. Network address ranges
b. Host names
c. Exposed hosts
d. Applications exposed on those hosts
e. OS and application version information
f. Patch state of the host and the applications

DNS Interrogation
After identifying all the associated domains, you can begin to query the DNS.
DNS is a distributed database used to map IP addresses to hostnames and vice
versa. If DNS is config-ured insecurely, it is possible to obtain revealing information
about the organization.
Types of Footprinting

FOOTPRINTING TOOLS
 A Whois domain lookup allows you to trace the ownership and tenure of a domain
name. Similar to how all houses are registered with a governing authority, all
domain name registries maintain a record of information about every domain name
purchased through them, along with who owns it, and the date till which it has been
purchased.
https://www.whois.com/whois/
 Nmap is used to discover hosts and services on a computer network by sending
packets and analyzing the responses. Nmap provides a number of features for
probing computer networks, including host discovery and service and operating
system.

Written for

Institution
Course

Document information

Uploaded on
March 3, 2024
Number of pages
9
Written in
2023/2024
Type
Class notes
Professor(s)
Dr ahmed ndanusa
Contains
All classes

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
erdammustapha

Get to know the seller

Seller avatar
erdammustapha Airforce Institute of Technology Kaduna
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 year
Number of followers
0
Documents
4
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions