- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 100字
- 2021-07-02 12:38:36
Scanning
This phase is a more direct approach in engaging the actual target. The scanning phase helps the penetration tester identify open and closed ports, active hosts on a network, services running on a system and network, operating system types, and vulnerabilities on systems. During the scanning phase, the information gathered will provide the penetration tester with a topological view of the target's environment.
Here are the objectives of scanning:
- Checking for live machines
- Checking for intrusion prevention system (IPS)
- Checking for Firewalls
- Checking for open and closed ports
- Checking for service versions
- Checking for vulnerabilities
- Creating a network diagram
推薦閱讀
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- 數(shù)字身份與元宇宙信任治理
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實(shí)踐
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 可信計(jì)算3.0工程初步(第二版)
- 隱私計(jì)算
- 云原生安全技術(shù)實(shí)踐指南
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 華為Anti-DDoS技術(shù)漫談
- 云計(jì)算安全防護(hù)技術(shù)
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- 交換機(jī)·路由器·防火墻(第2版)
- 信息系統(tǒng)安全等級化保護(hù)原理與實(shí)踐
- Real-World SRE
- Blockchain Development with Hyperledger