Pages

Thursday, 5 September 2013

Controls Assessment and Scheduling

Controls Assessment and Scheduling in Networks include steps or phases. Some of these are:-
1.Information Gathering.
2.Network Mapping.
3.Vulnerability Identification.
4.Penetration.
5.Gaining Access & Escalation
6.Enumerating Further.
7.Compromise Remote Users/Sites.
8.Maintaining Sites.
9.Covering Tracks.
We will Know discuss all of above One by One.

Information Gathering 

Following are the steps followed during Information Gathering Phase.
1.Locate the target Web presence.
2.Examine the target using search engines.
3.Search Web groups.
4.Search employee personal Web sites.
5.Search Security & Exchange Commission and finance sites.
6.Search uptime statistics sites.
7.Search system/network survey sites.
8.Search on P2P networks.
9.Search on Internet Relay Chat (IRC).
10.Search job databases.
11.Search newsgroups (NNTP).
12.Gain information from domain registrar.
13.Check for reverse DNS lookup presence.
14.Check more DNS information.
15.Check Spam database lookup.
16.Check to change WHOIS information.
Tools used for purpose of Information Gathering:
Firefox
Dogpile.com
Alexa.org
Archive.org

No comments:

Post a Comment