Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

Vulnerabilities assessment and testing

Beoordeling
-
Verkocht
-
Pagina's
9
Geüpload op
03-03-2024
Geschreven in
2023/2024

This book provides an invaluable knowledge to students in the technology disciplines and computing field about the concept of vulnerability assessment, testing, network scanning, how they are done as well as terminologies within the scope.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CYB 403-LECTURE NOTE 2
5 PHASES IN PEN-TESTING




1. INFORMATION GATHERING
Information Gathering is the process of collecting various types of info against the
targeted device or victim or organization. This is the first and foremost step and it is
absolutely necessary to carry out
this vital step. The more useful information, the better, as an ethical hacker you'd be able
to devise a more tailored approach to breach the security in the most efficient manner.

Information gathering can be classified into two types:
i. Active reconnaissance;
ii. Passive reconnaissance




 Footprinting is the technique to collect as much information as possible about the
targeted network/victim/system. The first step in attacking any network is to figure
out what to attack, to develop a "footprint" of the target network.

, Following are some branches of footprinting a learner should know before
gathering information
 Open source footprinting
 Network-based footprinting
 DNS interrogation

Open source footprinting
This type of footprinting is the safest, and hackers can do this without the worry
about breaking laws. This is publicly available information. Examples of this type
include: finding someone's email address, phone number, scanning IP through
automated tools, search for their age, DOB, house address, etc.

Most companies provide information about their companies on their official website
without realizing that hackers can benefit from that information provided by them.

Network-based footprinting
The basic goal is to learn more about the network. There is a lot to discover,
including, but not limited to, the following:
a. Network address ranges
b. Host names
c. Exposed hosts
d. Applications exposed on those hosts
e. OS and application version information
f. Patch state of the host and the applications

DNS Interrogation
After identifying all the associated domains, you can begin to query the DNS.
DNS is a distributed database used to map IP addresses to hostnames and vice
versa. If DNS is config-ured insecurely, it is possible to obtain revealing information
about the organization.
Types of Footprinting

FOOTPRINTING TOOLS
 A Whois domain lookup allows you to trace the ownership and tenure of a domain
name. Similar to how all houses are registered with a governing authority, all
domain name registries maintain a record of information about every domain name
purchased through them, along with who owns it, and the date till which it has been
purchased.
https://www.whois.com/whois/
 Nmap is used to discover hosts and services on a computer network by sending
packets and analyzing the responses. Nmap provides a number of features for
probing computer networks, including host discovery and service and operating
system.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
3 maart 2024
Aantal pagina's
9
Geschreven in
2023/2024
Type
College aantekeningen
Docent(en)
Dr ahmed ndanusa
Bevat
Alle colleges

Onderwerpen

€9,76
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
erdammustapha

Maak kennis met de verkoper

Seller avatar
erdammustapha Airforce Institute of Technology Kaduna
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
4
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen