Phase 2
In this Phase I'll tell you about scanningScanning
- Port scanners
- Dialers
- ICMP-Internet Control Message Protocol -scanners
- Network mappers
- Ping sweeps
- SNMP - Simple Network Management Protocol - sweepers
- Vulnerability scanners
The information that you are looking for during the scan is anything that can help you to carry out an attack on a specific target or you are trying to find the information that another hacker will find to see where the security gaps are:
- Operating system
- Computer name
- Software that may be installed
- User accounts
- IP address
If, during your hack on your own system, you find any of these, you will know where your weakness are.
You can view it at
https://www.youtube.com/playlist?list=PLtJnX8zxVeSnMWy_w8yn_ADRa7k96nGvF
No comments:
Post a Comment