Case study of Ethical Hacking

0 comments

It is requested

Knowing only the name of the organization, you should look for as much information as possible about it. Within the phases of the analysis, we will only contemplate the phases of recognition (recognition, fingerprinting) and scanning (basic commands and ports, services).

!!! It is not allowed to perform a web scan against the identified servers or launch semiautomatic tools in search of vulnerabilities. We will only work at the level of ports and services detection. !!!

As a result of this exercise:

The information found must be shown : (for example: information about employees, domains, IP, public servants, and any extra information), the tools used and the phase to which each type of test corresponds. The information can be grouped, for example, by phases, explaining the steps that have been followed, etc with good quality screenshots.

Note:

There is no need to write introduction or an abstract for this paper. Please, get down straight to describing fingerprinting phase.The attached document is a course material on first three phases of ethical hacking (recognition, fingerprinting and scanning) with description of tools. Use any tool convenient for you, but please, explain your choice. The name of organization will be given in private message.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}