John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?
Each correct answer represents a complete solution. Choose all that apply.
In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:
1.Information gathering
2.Determining network range
3.Identifying active machines
4.Finding open ports and applications
5.OS fingerprinting
6.Fingerprinting services
7.Mapping the network
Answer C is incorrect. In the enumeration phase, the attacker gathers information such as the network
user and group names, routing
tables, and Simple Network Management Protocol (SNMP) data. The techniques used in this phase are as follows:
1.Obtaining Active Directory information and identifying vulnerable user accounts
2.Discovering NetBIOS names
3.Employing Windows DNS queries
4.Establishing NULL sessions and queries
Javier
6 days agoMartin
8 days agoTheola
11 days agoMaybelle
20 days agoDona
3 days agoGracia
5 days agoIluminada
7 days agoNobuko
21 days agoAliza
25 days agoHaydee
1 months ago