Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
6Activity
0 of .
Results for:
No results containing your search query
P. 1
Hacking Module 03

Hacking Module 03

Ratings: (0)|Views: 240|Likes:
Published by Jitendra Kumar Dash

More info:

Published by: Jitendra Kumar Dash on Aug 09, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

10/10/2014

pdf

text

original

 
NMCSP2008 Batch-I
Module IIIScanning
 
Scenario
Jack and Dave were colleagues. It was Jack¶sidea to come up with an e-business company.However, conflicts in ideas saw them splitapart. Now, Dave heads a Venture-Capitalfunded e-business start-up company. Jack feltcheated and wanted to strike back at Dave¶scompany.He knew that due to intense pressure to getto market quickly, these start-ups often buildtheir infrastructures too fast to give security thethought it deserves.
Do you think that Jack is correct in hisassumption? What information does Jack need to launchan attack on Dave¶s company?Can Jack map the entire network of thecompany without being traced back?
 
Module Objectives
Definition of scanning
Objectives of scanning
Scanning techniques
Scanning tools
OS fingerprinting
Countermeasures

Activity (6)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
sungoo liked this
Sandeep Singh liked this
mrbrightside69 liked this
somenath_singh liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->