John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?
Each correct answer represents a complete solution. Choose all that apply.
In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:
1.Information gathering
2.Determining network range
3.Identifying active machines
4.Finding open ports and applications
5.OS fingerprinting
6.Fingerprinting services
7.Mapping the network
Answer C is incorrect. In the enumeration phase, the attacker gathers information such as the network
user and group names, routing
tables, and Simple Network Management Protocol (SNMP) data. The techniques used in this phase are as follows:
1.Obtaining Active Directory information and identifying vulnerable user accounts
2.Discovering NetBIOS names
3.Employing Windows DNS queries
4.Establishing NULL sessions and queries
Brianne
3 months agoColeen
3 months agoReita
3 months agoPamella
4 months agoRaul
4 months agoShaniqua
4 months agoLeonor
4 months agoXochitl
4 months agoZona
5 months agoElliott
5 months agoDeangelo
5 months agoCorinne
5 months agoLuisa
5 months agoEzekiel
5 months agoJavier
11 months agoPete
10 months agoLeonard
10 months agoLynna
10 months agoMartin
11 months agoTheola
11 months agoJoaquin
10 months agoAsha
10 months agoMirta
10 months agoRozella
10 months agoErick
10 months agoKina
10 months agoMelina
10 months agoIraida
10 months agoMaybelle
11 months agoDona
11 months agoGracia
11 months agoIluminada
11 months agoNobuko
11 months agoAliza
12 months agoHaydee
12 months ago