|
Introduction to Penetration Testing Part 3a Active Reconnaissance |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Introduction to Penetration Testing Part 3a Active Reconnaissance Par Forensic Focus BlogLe [2012-07-26] à 17:53:52
Présentation : by Si Biles, Thinking Security Apologies in advance, this is a bit of a connective blog entry this is a big topic, and it needs some scene setting, basic understanding and several weeks worth to get the most out of it. We live in a connected world now my other half was showing me a washing machine with a WiFi connection and an associated iPhone App that would allow you remote control of and reporting about your intimate garments spin cycle I wonder if that is really necessary to be honest, as even if it has finished, knowing that while I m in the office and the washing machine is at home is a complete waste of electrons. The network, and the connected nature of things is what allows us as penetration testers to attempt to compromise the security of a company without going anywhere near it. There are other aspects to full scale penetration testing as I ve alluded to before with social engineering and physical attack lock picking, not baseball bat parts of such a scope but a majority of the work is computer and network based. To that end, a good understanding and working knowledge of networking is pretty much a job pre-requisite. So, rather than giving you a lesson myself, I ll give you a quick and dirty set of online references this won t make you an expert by any stretch of the imagination, but hopefully it will get us through the rest of this section without too much head scratching.1 The OSI Model Internet Protocol IP Transmission Control Protocol TCP User Datagram Protocol UDP I would apologise for the laziness on my part, however I subscribe to Larry Wall s school of thought that it is a virtue if someone else has done it well enough already, why spend time re-inventing the wheel. The corollary of that is, if you find that there isn t a good explanation of something in that set that you d like to understand better add a comment on the bottom of this post and we ll bring it up to scratch perhaps both here and at Wikipedia - . So seing as you all now fully understand TCP IP packet structure and know your URG from your SYN Read more
Les derniers articles du site "Forensic Focus Blog" :
- Interview with Andrew Rector, Digital Forensics Student, Bloomsburg University - Webinar Geolocation Artifacts and Timeline Analysis in Digital Forensics - Webinar online now Pitfalls of Interpreting Forensic Artifacts in the Windows Registry - Guidance Software Releases EnCase Forensic v7.05 - Webinar Pitfalls of Interpreting Forensic Artifacts in the Windows Registry - Generating computer forensic supertimelines under Linux A comprehensive guide for Windows-based disk images - Forensic Examination of FrostWire version 5 - Book Review Mastering Windows Network Forensics Investigations - Introduction to Penetration Testing Part 3a Active Reconnaissance - Retrieving Digital Evidence Methods, Techniques and Issues
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|