Computer Science > Research Paper > CMIT 321 Ethical Hacking (2198)/ CMIT 321Reconnaissance Plan and Scanning Plan 3 UMUC. (All)

CMIT 321 Ethical Hacking (2198)/ CMIT 321Reconnaissance Plan and Scanning Plan 3 UMUC.

Document Content and Description Below

This document will serve as a Statement of Work (SOU) outlining Centralia Security Lab’s (CSL) proposed plan of action during the scanning phase of the penetration test. The below sections will deta... il the scope for both the reconnaissance plan as well as the scanning plan, to include tools to be used and mediation of vulnerabilities. The deliverables after this point of the penetration test will include a full technical report with details regarding all discovered vulnerabilities, the tools that were used, and what was gained or could be gained by exploiting said vulnerabilities. Reconnaissance Plan Overview The reconnaissance phase of a penetration test is one of the most important aspects. Reconnaissance is the act of gathering preliminary data or intelligence on your target. The data is gathered in order to better plan for your attack (Cybrary, 2015). There are two different types of reconnaissance, active and passive. Active reconnaissance involves gathering information about the target with direct contact, such as performing traceroute analysis, extracting DNS information, social engineering, etc. Passive reconnaissance involves information gathering with no direct contact, through means such as finding information from a search engine or social networking sites, monitoring website traffic, gathering financial information about the target through financial services, etc (EC-Council, 2019). Both means are important and can provide valuable information to help further down the road. The information gathered will help to form a strategy. Reconnaissance Methods As stated above, there are several reconnaissance methods available to gain information on a target such as Haverbrook Investment Group (HIG). To begin with, passive techniques such as utilizing search engines and social media websites are fairly simple and may provide information on things such as technology platforms used, login pages, contact information, physical locations and more. A fake social media account can be created to lure in company employees. Once they accept a friend request, their account profile can reveal even more potentially exploitable information. This can also lead to locating more employees who can also be harvested for information. [Show More]

Last updated: 1 year ago

Preview 1 out of 4 pages

Reviews( 0 )

Recommended For You

 Ethical Hacking> Research Paper > CMIT 321 Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan (All)

preview
CMIT 321 Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan

Reconnaissance Plan Overview During the reconnaissance phase I will attempt to gather as much intelligence on the target, Haverbrook Investment Group, as possible. This intel is vital to the success...

By Kirsch , Uploaded: Nov 20, 2020

$11

 Computer Science> Research Paper > Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan (All)

preview
Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan

Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan Reconnaissance Plan Overview The phase involves the active searching for vulnerabilities within the Haverbrook in...

By QuizMaster , Uploaded: Nov 02, 2020

$9

 Computer Science> Research Paper > CS 6601 Assignment 5 Georgia Institute Of Technology (All)

preview
CS 6601 Assignment 5 Georgia Institute Of Technology

#!/usr/bin/env python # coding: utf-8 # This was input cell with execution count: 1 import os import numpy as np from helper_functions import * # Please don't modify this cell # This was input...

By Muchiri , Uploaded: Apr 10, 2021

$9

 Religious Studies> Research Paper > REL 212 Approaches to Studying Religions Unit 3 Challenge 2. Strayer Universit. (All)

preview
REL 212 Approaches to Studying Religions Unit 3 Challenge 2. Strayer Universit.

Mauricio trained to be a museum curator. On his first day as an intern, his boss, Kevin, told him that a very exciting exhibit was coming to the museum. “There are very few artifacts from the mediev...

By QuizMaster , Uploaded: Mar 20, 2021

$9

 Military Studies> Research Paper > Defense Acquisition University CLM 031  Improved Statement of Work: The purpose of requirements documents (SOO/ SOW/PWS) is to establish those tasks that contractors must perform. (All)

preview
Defense Acquisition University CLM 031  Improved Statement of Work: The purpose of requirements documents (SOO/ SOW/PWS) is to establish those tasks that contractors must perform.

Defense Acquisition University CLM 031  Improved Statement of Work  The purpose of requirements documents (SOO/ SOW/PWS) is to establish those tasks that contractors must perform. The SOW/PWS shoul...

By Kirsch , Uploaded: Nov 03, 2022

$9

 *NURSING> Research Paper > BSN C493 Portfolio WGU - Western Governors University (All)

preview
BSN C493 Portfolio WGU - Western Governors University

BSN C493 Portfolio WGU - Western Governors University This portfolio represents my professional nursing growth. Western Governor university prepared me to advance my education professionally. Th...

By SuperSolutions© , Uploaded: Nov 23, 2020

$12

 *NURSING> Research Paper > Risk factors for diabetes (All)

preview
Risk factors for diabetes

This document is an informative and comprehensive piece providing a detailed overview of the risk factors associated with diabetes. It covers both type 1 and type 2 diabetes, delving into the various...

By Elly , Uploaded: Jul 27, 2023

$6.5

 *NURSING> Research Paper > NURSING NR 439 Evidence Based Practice: Research Article Critique. (All)

preview
NURSING NR 439 Evidence Based Practice: Research Article Critique.

NR 439: Evidence-Based Practice >Research Article Critique.

By Academia1434 , Uploaded: Jul 11, 2020

$10.5

 Programming> Research Paper > Computer Science Engineering & Technology Java Programming. Weather Generator (40 points) (All)

preview
Computer Science Engineering & Technology Java Programming. Weather Generator (40 points)

Computer Science Engineering & Technology Java Programming Question 3. Weather Generator (40 points) Overview A weather generator produces a "synthetic" time series of weather data for a locati...

By QuizMaster , Uploaded: Mar 20, 2021

$10.5

 Business> Research Paper > BUS 600 WEEK 6 FINAL RESEARCH PAPER (All)

preview
BUS 600 WEEK 6 FINAL RESEARCH PAPER

Research Paper Focus of the Research Paper The Research Paper will be a comprehensive research review of the significant principles of management communications used to successfully achieve or...

By ACADEMICTUTORIAL , Uploaded: Dec 03, 2020

$3.5

$12.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
144
0

Document information


Connected school, study & course



About the document


Uploaded On

Nov 02, 2020

Number of pages

4

Written in

Seller


seller-icon
QuizMaster

Member since 4 years

1074 Documents Sold


Additional information

This document has been written for:

Uploaded

Nov 02, 2020

Downloads

 0

Views

 144

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.


$12.00

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·