Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Footprinting and Scanning Networks
#1

Footprinting and Scanning Networks


Common Methodologies

Open Source Security Testing Methodology Manual (OSSTMM)
http://isecomosstmm/
Information Systems Security Assessment Framework (ISSAF)
http://oissgcontent/view/71/71/
NIST Guideline on Network Security Testing
http://csrc.nist.gov/publications/nistpubs/
Hacking Exposed Books
http://hackingexposedContents/contents.htm

Methodology

Simplified Attack & Pen Methodology

Footprinting
Scanning
Enumeration
Exploitation

Footprinting
Who are they?
Discovery of technology information
Public information gathering
Search Engines, DNS entries, Whois, job sites, etc.
Scanning
Enumeration
Exploitation

For more information about this article,please follow the link:
http://googleurl?sa=t&source=web&cd=1&ve...anning.ppt%26AutoIndex%3Dac35615479faebe5bac542bde3f7b9c9&ei=98uyTJXuFYS4vgPStL2pCg&usg=AFQjCNEWpzEGLgz7qFad4djRPl4z0XtQqA
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.