img Leseprobe Leseprobe

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Dr. Hidaia Mahmood Alassouli

EPUB
5,99
Amazon iTunes Thalia.de Weltbild.de Hugendubel Bücher.de ebook.de kobo Osiander Google Books Barnes&Noble bol.com Legimi yourbook.shop Kulturkaufhaus ebooks-center.de
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.

Dr. Hidaia Mahmood Alassouli img Link Publisher

Naturwissenschaften, Medizin, Informatik, Technik / Datenkommunikation, Netzwerke

Beschreibung

Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible.Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network.Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.The objective of the report is to explain to the user Footprinting, Reconnaissance, Scanning and Enumeration techniques and tools applied to computer networks The report contains of the following parts:Part A: Lab Setup Part B: Foot printing and ReconnaissancePart C: Scanning MethodologyPart D: Enumeration

Weitere Titel von diesem Autor
Weitere Titel in dieser Kategorie
Cover Desktop Witness
Michael A. Caloyannides
Cover Inferno Programming with Limbo
Phillip Stanley-Marbell
Cover Dependable Computing
Zbigniew T. Kalbarczyk
Cover LaTeX Cookbook
Stefan Kottwitz
Cover Smart Edge Computing
Prasenjit Chatterjee

Kundenbewertungen

Schlagwörter

Reconnaissance, Foot printing, Hacking, Enumeration, Computer Networking, Scanning Methodology