An Introduction to the Basics Pre An Introduction to the Basics
Modes of Ethical Hacking Insider attack Outsider attack Stolen equipment attack Physical entry Bypassed authentication attack Social engineering attack
The Attacker’s Process
The Attacker’s Process Performing Reconnaissance Scanning and enumeration Gaining access Escalation of privilege Maintaining access Covering tracks and placing backdoors
Performing Reconnaissance Systematic attempt to locate, gather, identify, and record information about the target. First step is passive information gathering.
Passive Info Gathering Google is your friend!!! Corporate Web Site Job Listings WHOIS/DNS/nslookup Analog/Digital Surveillance Public Records Dumpster Diving for Fun and Profit Social Engineering
Wikto and Spud http://www.security-database.com/toolswatch/
http://serversniff.com visual ip trace http://centralops.net
Macrosoft E-mail Spider Goog-mail.py
Nifty Google Search Stuff http://www.google.com/help/basics.html http://www.google.com/help/operators.html http://johnny.ihackstuff.com/ghdb/ MySQL Dumps mysql dump filetype:sql RedHat Config Files # kickstart filetype:cfg Allinurl: tsweb site:.edu
Scanning and Enumeration Considered the second pre-attack phase. Scanning is the active step of attempting to connect to systems to elicit a response. Enumeration is used to gather more in-depth information about the target, such as open shares and user account information.
http://techtionary.com/
http://www.irongeek.com - nmap tutorials