10-06-2017, 07:10 AM
Footprinting and Scanning Networks
Common Methodologies
Open Source Security Testing Methodology Manual (OSSTMM)
http://isecomosstmm/
Information Systems Security Assessment Framework (ISSAF)
http://oissgcontent/view/71/71/
NIST Guideline on Network Security Testing
http://csrc.nist.gov/publications/nistpubs/
Hacking Exposed Books
http://hackingexposedContents/contents.htm
Methodology
Simplified Attack & Pen Methodology
Footprinting
Scanning
Enumeration
Exploitation
Footprinting
Who are they?
Discovery of technology information
Public information gathering
Search Engines, DNS entries, Whois, job sites, etc.
Scanning
Enumeration
Exploitation
For more information about this article,please follow the link:
http://googleurl?sa=t&source=web&cd=1&ve...anning.ppt%26AutoIndex%3Dac35615479faebe5bac542bde3f7b9c9&ei=98uyTJXuFYS4vgPStL2pCg&usg=AFQjCNEWpzEGLgz7qFad4djRPl4z0XtQqA