Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization's network.
Identify the type of network attack Bob initiated on the target organization in the above scenario.
In the given scenario, Bob's actions align with the concept ofenumeration. Here's why:
Network Reconnaissance: Bob collected information about the organization's network topology and a list of live hosts. This initial step is part of network reconnaissance, where an attacker gathers details about the target system.
Enumeration: After collecting this information, Bob proceeded to launch further attacks. Enumeration involves actively probing a network to identify services, users, shares, and other system details. It helps attackers understand the target environment better.
Purpose of Enumeration: By identifying live hosts and understanding the network topology, Bob can tailor subsequent attacks more effectively. Enumeration provides crucial insights for attackers during the reconnaissance phase.
EC-Council Certified Security Specialist (E|CSS) course materials and study guide12.
Felicidad
4 days agoMarlon
9 days agoCeleste
14 days agoJaclyn
1 month agoMaile
1 month agoStefany
1 month agoJani
2 months agoMitsue
2 months agoMa
2 months agoRoxanne
2 months agoYan
2 months agoAzalee
2 months agoRupert
3 months agoRessie
3 months agoIesha
3 months agoDerick
3 months agoRenea
3 months agoLaura
4 months agoChristiane
4 months agoCaitlin
4 months agoChantell
4 months agoJaclyn
4 months ago