Please enable JavaScript.
Coggle requires JavaScript to display documents.
Pen test (Info Gathering & Vulnerability Analysis) (Target Classes…
Pen test (Info Gathering & Vulnerability Analysis)
Target Classes
Groups
Network Shares
Users
Web Pages
Domains
Applications
Networks
Services
Hosts
Tokens
Packet Investigation
Packet Crafting
Packet Inspection
Tools
Scanning
Network Devices
Networks
Computers
Services
Applications
Physical
Enumeration
Counting the detected instances
Inspecting Targets
Cryptography
Inspecting Certificates
Fingerprinting
Eavesdropping
Sniffing
Wireshark
Wired
Decompilation
Running Executables
Decompiler
Tools
Vulnerability Scan
Credential
Non-Credential
Types of Scans
Discovery Scan
Full Scan
Nikto
OpenVAS
Port Scan
Stealth Scan
Applications
Dynamic Analysis
Target Enviroment
Static Analysis
Scan Input
Application Scan
Scanning Considerations
Network Topology
Protocols Used?
Time to run scan?
Bandwidth Limitations
Analyse Scan Results
Asset Categorisation
False-Positive Results
Prioritise Vulnerabilities
Highest Impact?
Common Theme?
Payoff?
Leverage Information
Prioritise Activities
Map Vulnerabilities