Académique Documents
Professionnel Documents
Culture Documents
IP address ranges
Namespaces
Employee information
Phone numbers
Facility information
Job information
SCANNING
Techniques you use
Pings -
Ping sweeps - is a method that can establish a range of IP addresses
which map to live hosts.
Port scans scanning for open ports
Tracert - route (path) and measuring transit delays of packets across an
Internet Protocol (IP) network.
ENUMERATION
Gathered Information include
Usernames
Group information
Passwords
Hidden shares
Device information
SYSTEM HACKING
Process become much more complex at this point
Password Cracking
Dictionary Attacks
Brute-force Attacks
Hybrid Attack
Syllable Attack
Rule-based Attack - (Advance attack
Passive Online
Active Online
Offline Attacks
Nontechnical - Attacks
PASSIVE ONLINE ATTACKS
the attacker tends to be not engaged or less engaged than they would be
during other kinds of attacks
Data Hiding - hide the files placed on the system such as EXE files,
scripts, and other data.