Академический Документы
Профессиональный Документы
Культура Документы
COVERING
SCANNING
TRACKS
MAINTANING
GAINING ACCESS
ACCESS
MODULE 1
1. RECONNAISANCE
1.1 WHAT IS RECONNAISANCE??
• FOOTPRITNING IS THE THE PRE-ATTACK PHASE IN WHICH WE TRY TO COLLECT AS
MUCH INFORMAION WE CAN ABOUT THE VICTIM.
• IN OTHER WORDS IT IS A TYPE OF BLACK BOX TESTING IN WHICH THE USER TRIES
TO GRAB INFORMATION ABOUT THE VICTIM.THE INFORMATION MAY CONTAIN THE
GEOGRAPHICAL AREA OF THE VICTIMTHE IP ADDRESS OF THE VICTIM’S
COMPUTER,HIS IS ETC.
• 2.IT SAVES A LOT OF TIME BECAUSE OF THE PRE BUILT BLUEPRINT ABOUT THE
VICTIM.
• SOME OF THE FREEWARE WEBSITES THE OFFER MANY INFORMATION ABOUT THE
VICTIM’S COMPUTER ARE:
• 1.1 WHATISMYIP.COM
• 1.2 YOUGETSIGNAL.COM
• 1.3 LULLAR
• 1.4 DOMAINTOOLS.COM
• 1.5 EXPLOIT-DB.COM
WHATISMYIP.COM
DOMAINTOOLS.COM
HTTRACK WEBSITE COPIER
• WHATS MORE BETTER THAN HACKING A
WEBSITE??
• OF COURSE, DOWNLOADING THE ENTIRE
WEBSITE FOR YOUR OWN PERSONAL USE!!
3.ONE CAN STOP CRAWLING ON THESE SITES BY SPIDERS AND BOTS COMING
FROM SEARCHH ENGINES.
MODULE 2
2.0 WHAT IS SCANNING?
1.PORT SCANNING
A SERIES OF MESSAGES SEND BY SOMEONE TO BREAK INTO A COMPUTER TO LEARN ABOUT
SERVICES LIKE PORT ADDRESS AND PORT NUMBER.
2.NETWORK SCANNING
A PROCESDIRE OF IDENTIFYING ACTIVE HOSTS ON A NETWORK
3. VULNERIBILITY SCANNING
IDENTIFYING VULNERIBILITIES OF OPERATING SYSTEM PRESENT IN A NETWORK
SCANNING
TOOLS
1.ANGRY IP SCANNER
2.NMAP VULNERIBILTY SCANNER
MODULE 3
2. GOOGLE HACKING
GOOGLE IS THE MOST FAMOUS SEARCH ENGINE,THE MOST WIDELY KNOWN.
GOOGLE HACKING IS A COMPUTER HACKING TECHNIQUE THAT USES GOOGLE SEARCH AND OTHER GOOGLE APPS TO FIND SECURITY HOLES AND CONFIGURATION AND COMPUTER CODES THAT THE WEBSITE USES.
2.1 GOOGLE DORKS
FOR EXAMPLE:
/VIEW/SHTML
LIVEAPPLET INURL:LVAPPL
“adminlogin.asp”
“admin.apsx login”