Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Hacking Module 02

Hacking Module 02

Ratings: (0)|Views: 150 |Likes:
Published by Jitendra Kumar Dash

More info:

Published by: Jitendra Kumar Dash on Aug 09, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

10/25/2012

pdf

text

original

 
NMCSP2008 Batch-I
Module IIFootprinting
 
Scenario
 Adam is furious. He had applied for the networkengineer job at targetcompany.com He believesthat he was rejected unfairly. He has a good trackrecord, but the economic slowdown has seen manylayoffs including his. He is frustrated ±he needs a job and he feels he has been wronged. Late in theevening he decides that he will prove his mettle.
 W 
hat do you think Adam would do?
 W 
here would he start and how would he go about it?
 Are there any tools that can help him in his effort?
Can he cause harm to targetcompany.com?
 As a security professional, where can you lay checkpoints and how can you deploy countermeasures?
 
Module Objectives
Overview of the Reconnaissance Phase
Introducing Footprinting
Understanding the information gatheringmethodology of hackers
Comprehending the implications
Learning some of the tools used forreconnaissance phase
Deploying countermeasures

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->