logo

Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools

Identify steps to control and remove sensitive publicly available information based on the Site Security Handbook guidance.

11 Pages1105 Words345 Views
   

Added on  2023-06-15

About This Document

This article covers various cybersecurity techniques such as Footprinting, Scanning, Enumeration, and Obfuscation Tools. It provides insights into Nessus Scanning countermeasures, Nmap NSE Scripting, and Basic Banner Grabbing. Additionally, it includes a case study of a Brute force attack scenario and discusses various obfuscation tools.

Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools

Identify steps to control and remove sensitive publicly available information based on the Site Security Handbook guidance.

   Added on 2023-06-15

ShareRelated Documents
Running head: CYERSECURITY
CYERSECURITY
Name of the Student
Name of the University
Author Note
Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools_1
1
CYBERSECURITY
Table of Contents
Answer of Question number 1.........................................................................................................3
Footprinting.....................................................................................................................................3
Publicly Available Information...................................................................................................3
Answer of Question number 2.........................................................................................................4
Scanning..........................................................................................................................................4
SYN Scanning.............................................................................................................................5
UDP Scanning.............................................................................................................................5
ACK scanning..............................................................................................................................5
Window Scanning........................................................................................................................5
Answer of Question number 3.........................................................................................................5
Enumeration.....................................................................................................................................5
Nessus Scanning countermeasures..............................................................................................5
Nmap NSE Scripting...................................................................................................................6
Basic Banner Grabbing................................................................................................................6
Answer of Question Number 4........................................................................................................6
Case study of an Attack scenario.....................................................................................................6
Answer of question number 5..........................................................................................................8
Obfuscation Tools............................................................................................................................8
Reference.........................................................................................................................................9
Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools_2
2
CYBERSECURITY
Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools_3
3
CYBERSECURITY
Answer of Question number 1
Footprinting
Whenever browsing or using internet, without user acknowledgement a huge amount of
information is publicly available such as location details, visited website links and employee
informations of companies. To check potential security exposures and what are the information
hackers can access a technique can be used called Footprinting to generate a broad profile of an
organization’s security posture and prevent exploitation (Aviad, Węcel and Abramowicz 2013).
Type of
Footprinting
Sections Control and remove publicly
Available Information
Internet Network locks and subnets, TCP and
UDP
1. Determination of certain
subsidiaries.
2. Proper authorization.
3. Check publicly available
information.
4. WHOIS and DNS Enumeration.
5. DNS interrogation.
6. Network Reconnaissance.
Intranet Internal domain names, Network
protocols
Remote Access VPNs, Telephone Numbers
Extranet Type of connection, Domain names
Publicly Available Information
Sources Explanation Guidance
Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security - Assignment PDF
|8
|2242
|71

Performing Vulnerability Scan on Network
|12
|769
|44

Networking - Penetration Testing ( Scanning and Enumeration)
|4
|452
|34

Flooding attack Detection using Anomaly Techniques with Wireshark
|53
|13458
|342

COIT20261 Network Routing and Switching Term 1, 2019
|7
|2019
|65

The OSI and TCP/IP Models (PDF)
|9
|1512
|110