官术网_书友最值得收藏!

Scanning and enumeration

Without a doubt, almost every security professional wants to jump straight into exploiting boxes, but without understanding the basics, the exploits, and most importantly, the environment they are in. This can lead to mistakes or worse, such as breaking things in a live environment.

Scanning and enumeration allows a pen tester to understand their environment. The result one gets from these scans gives the red team a starting point to leverage vulnerabilities in different systems. Scanning is finding all available network services (TCP and UDP) running on the targeted hosts. This can help a red teamer discover whether SSH/Telnet is open to try a brute-force login and discover file shares to download data from, websites that may have vulnerabilities, or printers that may hold usernames and passwords. Enumeration is the discovery of services on the network to have a greater sense of information provided by the network services.

主站蜘蛛池模板: 开阳县| 滕州市| 邵阳市| 修水县| 孟州市| 长顺县| 炎陵县| 吉水县| 武平县| 荣成市| 青冈县| 平湖市| 连云港市| 丹江口市| 泉州市| 锡林郭勒盟| 塘沽区| 砚山县| 永州市| 墨竹工卡县| 贵港市| 文登市| 南木林县| 上饶市| 宁蒗| 雷州市| 丰城市| 深圳市| 琼结县| 库尔勒市| 垦利县| 五华县| 元朗区| 万荣县| 大足县| 嘉义县| 峨山| 台北市| 德钦县| 琼中| 西藏|