Chapter 2(gathering target information )

Get Started. It's Free
or sign up with your email address
Chapter 2(gathering target information ) by Mind Map: Chapter 2(gathering target information )

1. Footprinting technique gathering

1.1. Reconnaissance and footprinting

1.1.1. method of observing and collecting information about a potential target .

1.2. ethical hacking process

1.2.1. 1.footprinting

1.2.2. 2.scanning

1.2.3. 3.enumeration

1.2.4. 4.system hacking

1.3. information gathering tools and methodology

1.3.1. 1. unearth initial informstion

1.3.2. 2. locate the network range

1.3.3. 3.ascertain active machines

1.3.4. 4.discover open ports

1.3.5. 5.detect operating system

1.3.6. 6. uncover services on ports

1.3.7. 7.map the network

1.4. social engineering

1.4.1. attack vector that relies heavily on human interaction and often involves tricking people into breaking normal procedures

1.4.2. human based social engineering can be categorized as follow :

1.4.2.1. a. impersonate as important user

1.4.2.2. b.pose as third person

1.4.2.3. c.call technical support

1.4.2.4. d.shoulder surfing

1.4.2.5. e.dumpster diving

2. socsial engineering based computer

2.1. a.insider attack

2.2. b. identity theft

2.3. c.pishing attack

2.4. d.online scams

2.5. e.url obfuscation