Chapter 2 GATHERING TARGET INFORMATION

Get Started. It's Free
or sign up with your email address
Chapter 2 GATHERING TARGET INFORMATION by Mind Map: Chapter 2  GATHERING  TARGET  INFORMATION

1. reconnaisance & footprinting

1.1. Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to.

1.2. phase 1 : footprinting

1.2.1. involves gathering information about a potential target without the targeted individual's or company's knowledge such as IP address range, phone numbers and employee information

1.3. phase 2 : scanning

1.3.1. involves taking the information discovered during reconnaissance and using it to examine the network.

1.3.2. Tools that a hacker may employ during the scanning phase include dialers, ping sweeps , network mappers

1.4. phase 3 : enumeration

1.4.1. process to gather the information about a a target machine by actively connecting to it .

1.4.2. identify the user account, system account and admin account.

1.4.3. information gathered is usernames, passwords, server data, service information

1.5. phase 4 : system hacking

1.5.1. involves a methodical approach that includes cracking passwords, executing applications, hiding files, covering tracks, concealing evidence, and then pushing into a complex attack.

2. Social engineering

2.1. an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

2.2. types of social engineering attacks

2.2.1. phising , spear phising, pretexting, scareware

2.3. countermeasure for social engineering

2.3.1. delete any requests for financial information or password

2.3.2. report any suspicious activity

3. Information Gathering Tools and Methodology

3.1. 1. unearth initial information

3.2. 2. locate the network range

3.3. 3. ascertain active machine

3.4. 4. discover open ports/access points

3.5. 5. detect operating system

3.6. 6. uncover services on ports

3.7. 7. map the network

4. DNS enumeration

4.1. process of locating all DNS Servers and their corresponding records for an organization

4.2. sources of DNS information

4.2.1. DNSstuff

4.2.2. Whois

4.2.3. ARIN

4.2.4. NSLookup

5. Google hacking

5.1. an information gathering technique used by an attacker leveraging advanced Google searching technique