Free Academic Seminars And Projects Reports

Full Version: Footprinting and Scanning Networks
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Footprinting and Scanning Networks


Common Methodologies

Open Source Security Testing Methodology Manual (OSSTMM)
http://isecomosstmm/
Information Systems Security Assessment Framework (ISSAF)
http://oissgcontent/view/71/71/
NIST Guideline on Network Security Testing
http://csrc.nist.gov/publications/nistpubs/
Hacking Exposed Books
http://hackingexposedContents/contents.htm

Methodology

Simplified Attack & Pen Methodology

Footprinting
Scanning
Enumeration
Exploitation

Footprinting
Who are they?
Discovery of technology information
Public information gathering
Search Engines, DNS entries, Whois, job sites, etc.
Scanning
Enumeration
Exploitation

For more information about this article,please follow the link:
http://googleurl?sa=t&source=web&cd=1&ve...anning.ppt%26AutoIndex%3Dac35615479faebe5bac542bde3f7b9c9&ei=98uyTJXuFYS4vgPStL2pCg&usg=AFQjCNEWpzEGLgz7qFad4djRPl4z0XtQqA