Penetration Testing Footprinting
9 Pages2304 Words134 Views
Added on 2020-04-21
About This Document
This phase mainly covers certain aspects like the identification of the online system, finding of open or filtered traffic ports, what are the services which are running on what and on which number port, identification of the type and version of the operating system, rules of routing and firewall and many more. During the port scanning process one thing that is to be taken into note is that whatever the tool that is being used, it can have high chances of involving a lot of active proving of the targeted system.
Penetration Testing Footprinting
Added on 2020-04-21
ShareRelated Documents
End of preview
Want to access all the pages? Upload your documents or become a member.
Cyber Security - Assignment PDF
|8
|2242
|71
Firewall Testing on Kali Linux using Nmap
|18
|1810
|98
Network Security Tools: Nmap and Metasploit
|9
|1824
|206
Firewall and Configuration Report 2022
|22
|1741
|23
Identifying Network Threats using Network Security Tools
|8
|1806
|402
Identification of Threats using Nmap and Metasploit Network Security Tools
|9
|1788
|54