Computer Science > Research Paper > CMIT 321 Ethical Hacking (2198)/ CMIT 321Reconnaissance Plan and Scanning Plan 3 UMUC. (All)
This document will serve as a Statement of Work (SOU) outlining Centralia Security Lab’s (CSL) proposed plan of action during the scanning phase of the penetration test. The below sections will deta... il the scope for both the reconnaissance plan as well as the scanning plan, to include tools to be used and mediation of vulnerabilities. The deliverables after this point of the penetration test will include a full technical report with details regarding all discovered vulnerabilities, the tools that were used, and what was gained or could be gained by exploiting said vulnerabilities. Reconnaissance Plan Overview The reconnaissance phase of a penetration test is one of the most important aspects. Reconnaissance is the act of gathering preliminary data or intelligence on your target. The data is gathered in order to better plan for your attack (Cybrary, 2015). There are two different types of reconnaissance, active and passive. Active reconnaissance involves gathering information about the target with direct contact, such as performing traceroute analysis, extracting DNS information, social engineering, etc. Passive reconnaissance involves information gathering with no direct contact, through means such as finding information from a search engine or social networking sites, monitoring website traffic, gathering financial information about the target through financial services, etc (EC-Council, 2019). Both means are important and can provide valuable information to help further down the road. The information gathered will help to form a strategy. Reconnaissance Methods As stated above, there are several reconnaissance methods available to gain information on a target such as Haverbrook Investment Group (HIG). To begin with, passive techniques such as utilizing search engines and social media websites are fairly simple and may provide information on things such as technology platforms used, login pages, contact information, physical locations and more. A fake social media account can be created to lure in company employees. Once they accept a friend request, their account profile can reveal even more potentially exploitable information. This can also lead to locating more employees who can also be harvested for information. [Show More]
Last updated: 1 year ago
Preview 1 out of 4 pages
Ethical Hacking> Research Paper > CMIT 321 Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan (All)
Reconnaissance Plan Overview During the reconnaissance phase I will attempt to gather as much intelligence on the target, Haverbrook Investment Group, as possible. This intel is vital to the success...
By Kirsch , Uploaded: Nov 20, 2020
$11
Computer Science> Research Paper > Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan (All)
Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan Reconnaissance Plan Overview The phase involves the active searching for vulnerabilities within the Haverbrook in...
By QuizMaster , Uploaded: Nov 02, 2020
$9
Computer Science> Research Paper > CS 6601 Assignment 5 Georgia Institute Of Technology (All)
#!/usr/bin/env python # coding: utf-8 # This was input cell with execution count: 1 import os import numpy as np from helper_functions import * # Please don't modify this cell # This was input...
By Muchiri , Uploaded: Apr 10, 2021
$9
Religious Studies> Research Paper > REL 212 Approaches to Studying Religions Unit 3 Challenge 2. Strayer Universit. (All)
Mauricio trained to be a museum curator. On his first day as an intern, his boss, Kevin, told him that a very exciting exhibit was coming to the museum. “There are very few artifacts from the mediev...
By QuizMaster , Uploaded: Mar 20, 2021
$9
Military Studies> Research Paper > Defense Acquisition University CLM 031 Improved Statement of Work: The purpose of requirements documents (SOO/ SOW/PWS) is to establish those tasks that contractors must perform. (All)
Defense Acquisition University CLM 031 Improved Statement of Work The purpose of requirements documents (SOO/ SOW/PWS) is to establish those tasks that contractors must perform. The SOW/PWS shoul...
By Kirsch , Uploaded: Nov 03, 2022
$9
*NURSING> Research Paper > BSN C493 Portfolio WGU - Western Governors University (All)
BSN C493 Portfolio WGU - Western Governors University This portfolio represents my professional nursing growth. Western Governor university prepared me to advance my education professionally. Th...
By SuperSolutions© , Uploaded: Nov 23, 2020
$12
*NURSING> Research Paper > Risk factors for diabetes (All)
This document is an informative and comprehensive piece providing a detailed overview of the risk factors associated with diabetes. It covers both type 1 and type 2 diabetes, delving into the various...
By Elly , Uploaded: Jul 27, 2023
$6.5
*NURSING> Research Paper > NURSING NR 439 Evidence Based Practice: Research Article Critique. (All)
NR 439: Evidence-Based Practice >Research Article Critique.
By Academia1434 , Uploaded: Jul 11, 2020
$10.5
Programming> Research Paper > Computer Science Engineering & Technology Java Programming. Weather Generator (40 points) (All)
Computer Science Engineering & Technology Java Programming Question 3. Weather Generator (40 points) Overview A weather generator produces a "synthetic" time series of weather data for a locati...
By QuizMaster , Uploaded: Mar 20, 2021
$10.5
Business> Research Paper > BUS 600 WEEK 6 FINAL RESEARCH PAPER (All)
Research Paper Focus of the Research Paper The Research Paper will be a comprehensive research review of the significant principles of management communications used to successfully achieve or...
By ACADEMICTUTORIAL , Uploaded: Dec 03, 2020
$3.5
Connected school, study & course
About the document
Uploaded On
Nov 02, 2020
Number of pages
4
Written in
This document has been written for:
Uploaded
Nov 02, 2020
Downloads
0
Views
144
Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students
Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.
Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality
Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·