Week 2 Notes - Week 2 Footprinting and Social Enginnering*Assignments not due until 9\/11 Linux Help-> Linux Quiz-> pts do not count Zero Day does

Week 2 Notes - Week 2 Footprinting and Social...

This preview shows page 1 - 2 out of 4 pages.

Week 2 – Footprinting and Social Enginnering ***Assignments not due until 9/11*** Linux Help -> Linux Quiz -> pts do not count Zero Day: does not have a known resolution. Identified vulnerability Average between intrusion and detection is 9 months. May be notified by external resource, such as FBI, that your organization has been hacked. Information Gathering 1. Gather Information 2. Determine network range 3. Identity active machines 4. Find open ports and access ports 5. Detecting operating systems 6. Using fingerprinting services 7. Mapping the network Profiling - Website - Key employees - Open positions/job requests - Affiliate, parent site, sister companies - Technology/software used by organization - Financial information – Hoover’s, Dun and Bradstreet, Yahoo! Financial, Bloomsberg Google Hacking - Johnny Long’s Google Hacking Database (GHDB) -“intitle” – instructs Google to search for a term within title of document Domain Information Leakage -Manual registrar query -Automatic registrar query -Whois -Nslookup -Internet Assigned Numbers Authority (IANA) -Determining a network range

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture