Vulnerability Scanning - 1 Chapter 9 Vulnerabilities...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Zouheir TRABELSI 1 Chapter 9: Hacking Methodology
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Zouheir TRABELSI 2 P l a n Discovery Step Vulnerability Analysis Step Attack Step
Background image of page 2
Zouheir TRABELSI 3 Discovery and Vulnerability Analysis Step Gathering information on the target network or system: Social engineering (Telephone, friends, visits, etc.) TCP/IP commands (Tools, or on-line Windows or Unix commands)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Zouheir TRABELSI 4 Find active machines and betweens routers : Ping Traceroute (Unix) / Tracert (Windows) Find open ports : NetScanTools Portscanners Nmap Find out initial information: Whois NsLookup Open Source Find out address range of the network: ARIN (American registry for internet numbers) Discovery and Vulnerability analysis Step Information gathering on the target networks or systems:
Background image of page 4
Zouheir TRABELSI 5 Figure out the operating systems: GFI LANguard Network Security Scanner Queso Nmap Figure out which services are running on each port: Default port and OS Telnet Vulnerability scanners Map out the network: Traceroute Visual ping Cheops Discovery and Vulnerability analysis Step Information gathering on the target network or system:
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Zouheir TRABELSI 6 Find out initial information: Open Source Whois NsLookup Some companies give away large amounts of information without knowing it. That information would greatly simplify an attacker’s job. Example: « Company X is proud to announce the opening of its new state of the art network operations center. Company X has built a premier center to provide its customers with the best Monitoring capabilities
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 36

Vulnerability Scanning - 1 Chapter 9 Vulnerabilities...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online