Information Gathering
Methodology
1. The attacker would first unearth initial information (such as domain name).
2. locate the network range of the target system (using tools such as Nslookup, whois etc).
3. Ascertain the active machines (for instance by pinging the machine).
4. discover open ports or access points (using tools such as port scanners).
5. Detect operating systems (for instance querying with telnet).
6. Uncover services on ports and
7. Map the network.
No comments:
Post a Comment
NO LINK!!!!!!!!