Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 5 Topics (What the information-gathering process entails (Step 4:…
Chapter 5 Topics
What the information-gathering process entails
Step 4: Finding open ports, active services, and access points
Step 5: Detecting operating systems
Step 3: Identifying active computers and devices
Step 2: Determining the network's logical and physical dimensions
Step 1: Gathering information from general resources
Step 6: Researching known vulnerabilities of running software
What the nature of Google hacking is
Error messages that contain too much information
Files containing passwords
Advisories and server vulnerabilities
Sensitive documents
Pages containing logon portals
Pages containing network or vulnerability data
How insecure applications are exploited
File Transport Protocol
Post Office Protocol
Telnet
Hypertext Transfer Protocol
Simple Network Management Protocol
How to explore domain information leakage
Nslookup
Internet Assigned Numbers Authority
Whois
Traceroute
How to track an organization's employees
Posted content about personal, political, or beliefs
Posting derogatory information about people
Posted pictures, video, or information
Discriminatory comments or fabricated qualifications
What type of information can be found in an organization's website
Application-specific configuration issues
Product-specific defects
Vulnerabilities in the discovered products
How attackers discover financial information
Foot-printing
Through government websites
Databases of organization finances