Please enable JavaScript.
Coggle requires JavaScript to display documents.
CEH (5.Scanning (Checking for Live Systems (Wardialing (wardialing is
…
CEH
5.Scanning
Armed with a knowledge of network fundamentals, a scanner, and the results of
a thorough footprinting, it is possible to get a decent picture of a target.
-
-
Vulnerability Scan
Two commonly used vulnerability scanners
include Tenable’s Nessus and Rapid7’s Nexpose. In addition there are specialized
scanners such as Burp Suite, Nikto, and WebInspect
-
-
1.Hacking in general
Ethical hackers are employed either through contracts or direct employment to test the
security of an organization.
In
addition, ethical hackers do not reveal the weaknesses of an evaluated system to anyone
other than the system owner.
-
-
-
-
-
- Hijacking wifi and bluetooth
-
-
-
-
-
-
-
-
-
-
-