logo

Penetration Testing Footprinting

9 Pages2304 Words134 Views
   

Added on  2020-04-21

About This Document

This phase mainly covers certain aspects like the identification of the online system, finding of open or filtered traffic ports, what are the services which are running on what and on which number port, identification of the type and version of the operating system, rules of routing and firewall and many more. During the port scanning process one thing that is to be taken into note is that whatever the tool that is being used, it can have high chances of involving a lot of active proving of the targeted system.

Penetration Testing Footprinting

   Added on 2020-04-21

ShareRelated Documents
Running Head: COMPUTER AND NETWORK SECURITYComputer and Network Security[Name of the Student][Name of the University][Author note]
Penetration Testing Footprinting_1
COMPUTER AND NETWORK SECURITY1The descriptions of the methodology for Penetration Testing are given below:Footprinting:The possibility of success for penetration test exercises increases when more informationare gathered can be understood very easily.Footprinting can be defined as one part of the part of information gathering for penetrationtesting. The footpirnting is mainly performed so as to gather the maximum amout of informationthat is available about the targeted system that is going to be built (Stepien Peyton and Xiong2012). Many free tools are available in market and this includes tools like whois, spiderfoot andmany more. Along with this there are also other tools that are available in the Kali Linux Distro.The penetration testers are able to gather a lot of information which are confidential aswell a very important. They probe the target system and they stay invisible as well. This phaseshould be used as much as possible and along with this new ideas should be created for theidentification of various loopholes.Scanning and Enumeration: After the completion of the Footprinting process, we can move into the process ofscanning and enumeration. This phase mainly covers certain aspects like the identification of theonline system, finding of open or filtered ports, what are the services which are running on whatand on which number port, identification of the type and version of the operating system, rules ofrouting and firewall and many more.During the port scanning process one thing that is to be taken into note is that whateverthe tool that is being used, it can have high chances of involving a lot of active proving of the
Penetration Testing Footprinting_2
COMPUTER AND NETWORK SECURITY2targeted system. Nmap is one of the famous free port scanner tool (Gillani et al. 2015). This canbe used in both windows as well as on the linux systems due the fact that it is a cross platformsoftware.After identification of the open ports we are capable of using the services and the OSfingerprinting tool. This tool can be used for identifying the open port servces. Some of thefamous OS fingerprinting tools are Httprint, Amap and many more.Denial of Service AttackOnce the attempt of penetration is done there are two possible outcomes. This outcomesinvolves successful penetration and the second one is failure in penetration. Now we are going todiscuss about the after effects of failed penetration testing.When the penetration fails, then there still remains the possibility of a DOS attack by theattacker. DOS attack or denial of service attack can be defined as an attempt made by theattacker so as to make a service become unavailable to the right user or may to system failure.Once a system is attacked by the DOS attack then the whole system would be flooded bythe activities of the attacker associated with unavailability of service for normal users (Jia Hongand Kim 2015). This is ultimately result in disruptive service, dissatisfaction amongst the usersand huge losses in case if the system is associated with making money.The most popular attack amongst the DOS attack is the DDOS or distributed denial ofservice attack. This is the most powerful type of attack due to the fact that many systems areattacked at the same time. Some of the commonly known DDOS attacks are listed below:
Penetration Testing Footprinting_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security - Assignment PDF
|8
|2242
|71

Firewall Testing on Kali Linux using Nmap
|18
|1810
|98

Network Security Tools: Nmap and Metasploit
|9
|1824
|206

Firewall and Configuration Report 2022
|22
|1741
|23

Identifying Network Threats using Network Security Tools
|8
|1806
|402

Identification of Threats using Nmap and Metasploit Network Security Tools
|9
|1788
|54