Thursday, December 17, 2009

Hacking Phase 2 - Scanning

Phase 2 - Scanning

    *

      Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.
    *

      Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.
    *

      Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.

0 comments:

Post a Comment