Chapter 2(gathering target information )

Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
Chapter 2(gathering target information ) создатель Mind Map: Chapter 2(gathering target information )

1. Footprinting technique gathering

1.1. Reconnaissance and footprinting

1.1.1. method of observing and collecting information about a potential target .

1.2. ethical hacking process

1.2.1. 1.footprinting

1.2.2. 2.scanning

1.2.3. 3.enumeration

1.2.4. 4.system hacking

1.3. information gathering tools and methodology

1.3.1. 1. unearth initial informstion

1.3.2. 2. locate the network range

1.3.3. 3.ascertain active machines

1.3.4. 4.discover open ports

1.3.5. 5.detect operating system

1.3.6. 6. uncover services on ports

1.3.7. 7.map the network

1.4. social engineering

1.4.1. attack vector that relies heavily on human interaction and often involves tricking people into breaking normal procedures

1.4.2. human based social engineering can be categorized as follow :

1.4.2.1. a. impersonate as important user

1.4.2.2. b.pose as third person

1.4.2.3. c.call technical support

1.4.2.4. d.shoulder surfing

1.4.2.5. e.dumpster diving

2. socsial engineering based computer

2.1. a.insider attack

2.2. b. identity theft

2.3. c.pishing attack

2.4. d.online scams

2.5. e.url obfuscation