ethicalhacking-130625095228-phpapp01.pdf

Network protocols tcpip netbios netbeui ipx osi and

Info icon This preview shows pages 10–14. Sign up to view the full content.

Network Protocols (TCP/IP, NetBIOS / Netbeui, IPX, OSI) and associated technologies (DNS, FTP, HTTP). Network Topologies (Token Passing, Ethernet). Operating Systems: UNIX, Argus, Solaris and Microsoft Operating Environments. Advanced knowledge of security and encryption mechanisms and strong experience with systems implementation. Application Servers (Websphere, Weblogic). Web Servers (Netscape, Apache, Microsoft). Mail Servers (POP3). Security Authorization/Transaction, Network Security (VPN, SSL, Smart Cards, Biometrics). Cryptographic tools, methods, systems and protocols: HTTPS, IPsec, PGP, DES etc. Exceptional interpersonal communication and presentation skills are must.
Image of page 10

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

11 CHAPTER 2: ETHICAL HACKING METHODOLOGY CHAPTER 2: ETHICAL HACKING METHODOLOGY 2.1 THE PHASES OF ETHICAL HACKING T he process of ethical hacking can be broken down into five distinct phases. An ethical hacker follows processes these steps to gain and maintain entry into a computer system Figure 1.1 illustrates the five phases that hackers generally follow in hacking a computer system. OBJECTIVE COVERED IN THIS CHAPTER: THE PHASES OF ETHICAL HACKING Phase 1- Reconnaissance Phase 2- Scanning Phase 3- Gaining Access Phase 4- Maintaining Access Phase 5- Clearing Tracks UNDERSTANDING TESTING TYPES TOOLS USED IN ETHICAL HACK
Image of page 11
12 CHAPTER 2: ETHICAL HACKING METHODOLOGY Figure 2.1 : The phases of Ethical hacking. 2.1.1 Phase 1- Reconnaissance The first and most important step in an attack involves finding out as much information as possible about the TOE (Target of Evaluation). A passive information gathering approach is taken and will not raise any alarms. Patience and creativity are also necessary as this can be the longest phase of the attack. In the world of ethical hacking, reconnaissance applies to the process of information gathering. Reconnaissance is a catch all term for watching the hacking target and gathering information about how, when, and where they do things. A. Understanding Competitive Intelligence Competitive intelligence means information gathering about competitors’ products, marketing, and technologies. Several tools exist for the purpose of competitive intelligence gathering and can be used by hackers to gather information about a potential target.
Image of page 12

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

13 CHAPTER 2: ETHICAL HACKING METHODOLOGY Using SpyFu Go to the website and enter the website address of the target in the search field: Figure 2.2 : Competitive intelligence using SpyFu Using KeywordSpy Go to the website and enter the website address of the target in the search field: Figure 2.3 : Competitive intelligence using KeywordSpy Review the report and determine valuable keywords, links, or other information.
Image of page 13
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern