Chapter 2(gathering target information )
by Ain Husairi
1. Footprinting technique gathering
1.1. Reconnaissance and footprinting
1.1.1. method of observing and collecting information about a potential target .
1.2. ethical hacking process
1.2.1. 1.footprinting
1.2.2. 2.scanning
1.2.3. 3.enumeration
1.2.4. 4.system hacking
1.3. information gathering tools and methodology
1.3.1. 1. unearth initial informstion
1.3.2. 2. locate the network range
1.3.3. 3.ascertain active machines
1.3.4. 4.discover open ports
1.3.5. 5.detect operating system
1.3.6. 6. uncover services on ports
1.3.7. 7.map the network
1.4. social engineering
1.4.1. attack vector that relies heavily on human interaction and often involves tricking people into breaking normal procedures
1.4.2. human based social engineering can be categorized as follow :
1.4.2.1. a. impersonate as important user
1.4.2.2. b.pose as third person
1.4.2.3. c.call technical support
1.4.2.4. d.shoulder surfing
1.4.2.5. e.dumpster diving