Download presentation
Presentation is loading. Please wait.
1
An Introduction to the Basics
Pre An Introduction to the Basics
2
Modes of Ethical Hacking
Insider attack Outsider attack Stolen equipment attack Physical entry Bypassed authentication attack Social engineering attack
4
The Attacker’s Process
5
The Attacker’s Process
Performing Reconnaissance Scanning and enumeration Gaining access Escalation of privilege Maintaining access Covering tracks and placing backdoors
7
Performing Reconnaissance
Systematic attempt to locate, gather, identify, and record information about the target. First step is passive information gathering.
9
Passive Info Gathering
Google is your friend!!! Corporate Web Site Job Listings WHOIS/DNS/nslookup Analog/Digital Surveillance Public Records Dumpster Diving for Fun and Profit Social Engineering
11
Wikto and Spud
12
http://serversniff.com visual ip trace http://centralops.net
14
Macrosoft E-mail Spider
Goog-mail.py
16
Nifty Google Search Stuff
MySQL Dumps mysql dump filetype:sql RedHat Config Files # kickstart filetype:cfg Allinurl: tsweb site:.edu
23
Scanning and Enumeration
Considered the second pre-attack phase. Scanning is the active step of attempting to connect to systems to elicit a response. Enumeration is used to gather more in-depth information about the target, such as open shares and user account information.
30
http://www.irongeek.com - nmap tutorials
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.