Ehdf 1
Ehdf 1
Ehdf 1
Network Scanning
The purpose of each scanning process is given below:
Port Scan– detecting open ports and services running on the
target.
Network Scan– IP addresses, Operating system details, Topology
details, trusted routers information etc
Vulnerability– scanning for known vulnerabilities or weakness in
a system
Scanning Methodology:-
Check for Live Systems:
Ping scan checks for the live system by sending ICMP echo
request packets. If a system is alive, the system responds with
ICMP echo reply packet containing details of TTL, packet size
etc.
NetBIOS Enumeration
NetBIOS stands for Network Basic Input Output System. It
Allows computer communication over a LAN and
allows them to share files and printers.
NetBIOS names are used to identify network devices over TCP/IP
(Windows).
SNMP Enumeration
SNMP (Simple Network Management Protocol) is an application
layer protocol which uses UDP protocol to
maintain and manage routers, hubs and switches other network
devices on an IP network. SNMP enumeration is used to
enumerate user accounts, passwords, groups, system names,
devices on a target system.
LDAP Enumeration
The Lightweight Directory Access Protocol is a protocol used to
access directory listings within Active Directory or
from other Directory Services.
SMTP Enumeration
The Simple Mail Transport Protocol is used to send email
messages as opposed to POP3 or IMAP which can be
used to both send and receive messages.
DNS Enumeration
DNS enumeration is the process of locating all the DNS servers
and their corresponding records for an organization.
2. Software Keylogger
SpywareSpyware is stealthy computer monitoring software that
allows you to secretly record all activities
of a computer user.
Q.13explain penetration testing methods
Penetration testing methods
External testing
External penetration tests target the assets of a company that
are visible on the internet, e.g., the webapplication itself, the
company website, and email and domain name servers (DNS).
The goal is to gainaccess and extract valuable data.
Internal testing
In an internal test, a tester with access to an application behind
its firewall simulates an attack by a malicious insider. This isn’t
necessarily simulating a rogue employee. A common starting
scenario can be an employee whose credentials were stolen due
to a phishing attack.
Blind testing
In a blind test, a tester is only given the name of the enterprise
that’s being targeted. This gives security personnel a real-time
look into how an actual application assault would take place.
Double-blind testing
In a double blind test, security personnel have no prior
knowledge of the simulated attack. As in the real
world, they won’t have any time to shore up their defenses
before an attempted breach.
Targeted testing
In this scenario, both the tester and security personnel work
together and keep each other appraised of their movements.
This is a valuable training exercise that provides a security team
with real-time feedback from a hacker’s point of view.
Q.14 What is digital forensic
Digital Forensics is a branch of forensic science which includes the
identification, collection, analysis and reporting any valuable digital
information in the digital devices related to the computer crimes, as a part
of the investigation. In simple words, Digital Forensics is the process of
identifying, preserving, analyzing and presenting digital evidences.
1. Identification of evidence: It includes of identifying evidences related to the
digital crime in storage media, hardware, operating system, network and/or
applications. It is the most important and basic step.
2. Collection: It includes preserving the digital evidences identified in the first
step so that they doesn’t degrade to vanish with time. Preserving the digital
evidences is very important and crucial.
3. Analysis: It includes analyzing the collected digital evidences of the
committed computer crime in order to trace the criminal and possible path
used to breach into the system.
4. Documentation: It includes the proper documentation of the whole digital
investigation, digital evidences, loop holes of the attacked system etc. so
that the case can be studied and analysed in future also and can be
presented in the court in a proper format.
5. Presentation: It includes the presentation of all the digital evidences and
documentation in the court in order to prove the digital crime committed and
identify the criminal.
Branches of Digital Forensics:
Media forensics: It is the branch of digital forensics which includes
identification, collection, analysis and presentation of audio, video and image
evidences during the investigation process.
Cyber forensics: It is the branch of digital forensics which includes
identification, collection, analysis and presentation of digital evidences
during the investigation of a cyber crime.
Mobile forensics: It is the branch of digital forensics which includes
identification, collection, analysis and presentation of digital evidences
during the investigation of a crime committed through a mobile device like
mobile phones, GPS device, tablet, laptop.
Software forensics: It is the branch of digital forensics which includes
identification, collection, analysis and presentation of digital evidences
during the investigation of a crime related to softwares only.
Step-1 :
The process of incident management starts with an alert that reports an incident
that took place. Then comes the engagement of the incident response team
(IRT). Prepare for handling incidents.
Step-2 :
Identification of potential security incidents by monitoring and report all
incidents.
Step-3 :
Assessment of identified incidents to determine the appropriate next steps for
mitigating the risk.
Step-4 :
Respond to the incident by containing, investigating, and resolving it (based on
the outcome of step 3).
Step-5 :
Learn and document key takeaways from every incident.