Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Footprinting and Scanning Networks
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Footprinting and Scanning Networks


Common Methodologies


Open Source Security Testing Methodology Manual (OSSTMM)
http://www.isecomosstmm/
Information Systems Security Assessment Framework (ISSAF)
http://www.oissgcontent/view/71/71/
NIST Guideline on Network Security Testing
http://csrc.nist.gov/publications/nistpubs/
Hacking Exposed Books
http://www.hackingexposedContents/contents.htm


Methodology


Simplified Attack & Pen Methodology

Footprinting
Scanning
Enumeration
Exploitation

Footprinting
Who are they?
Discovery of technology information
Public information gathering
Search Engines, DNS entries, Whois, job sites, etc.
Scanning
Enumeration
Exploitation


For more information about this article,please follow the link:
http://www.googleurl?sa=t&source=web&cd=...anning.ppt%26AutoIndex%3Dac35615479faebe5bac542bde3f7b9c9&ei=98uyTJXuFYS4vgPStL2pCg&usg=AFQjCNEWpzEGLgz7qFad4djRPl4z0XtQqA