Access over 20 million homework & study documents

Reconnaissance And Scanning

Content type
User Generated
Subject
Computer Science
School
University of Maryland Global Campus
Type
Homework
Rating
Showing Page:
1/7
Running Header: PEN TEST 1
Penetration Test Proposal
Deliverable 2: Reconnaissance Plan and Scanning Plan
Name:
Course Number and Section:
Instructor:
Date:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7
PEN TEST 2
Reconnaissance Plan
Overview
Also known as the information gathering or footprinting phase, reconnaissance is the
initial stage of the pen test (GreyCampus, 2020). In this stage, the attacker will carry out an
investigation about the site and on the organization. The pen tester may start by going
through the organisation's structure to find out the company's formation and pecking order,
business structure, telephone, shares, and several means of communication that may be
vulnerable to attacks.
Reconnaissance Methods
The attacker will utilize two ways to gather information about the organization to
carry out the attack; the Active and Passive methods. The active reconnaissance involves the
pen tester compromising the system to acquire information. On the other hand, Passive
reconnaissance involves the pen tester collecting data about the target without directly
compromising any system operations. To carry out a pen test on Havenbrook Investement
Group, the pen tester will be utilizing both the Active and the Passive methods. Some of the
Passive styles and methods that will be used include Dumpster diving, SQLMAP, Nessus,
WHOIS, and WarDriving. For the Active method, the attacker will use the Port Scanning
technique. The pen tester will utilize all the methods mentioned above to collect data
regarding the Havenbrook Investment Groups network.
Scanning Plan
Overview
This stage is similar to the reconnaissance stage. During the scanning stage, the pen
tester will collect precise details about the targeted system like the passwords, software,

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now
Unformatted Attachment Preview
Running Header: PEN TEST 1 Penetration Test Proposal Deliverable 2: Reconnaissance Plan and Scanning Plan Name: Course Number and Section: Instructor: Date: PEN TEST 2 Reconnaissance Plan Overview Also known as the information gathering or footprinting phase, reconnaissance is the initial stage of the pen test (GreyCampus, 2020). In this stage, the attacker will carry out an investigation about the site and on the organization. The pen tester may start by going through the organisation's structure to find out the company's formation and pecking order, business structure, telephone, shares, and several means of communication that may be vulnerable to attacks. Reconnaissance Methods The attacker will utilize two ways to gather information about the organization to carry out the attack; the Active and Passive methods. The active reconnaissance involves the pen tester compromising the system to acquire information. On the other hand, Passive reconnaissance involves the pen tester collecting data about the target without directly compromising any system operations. To carry out a pen test on Havenbrook Investement Group, the pen tester will be utilizing both the Active and the Passive methods. Some of the Passive styles and methods that will be used include Dumpster diving, SQLMAP, Nessus, WHOIS, and WarDriving. For the Active method, the attacker will use the Port Scanning technique. The pen tester will utilize all the methods mentioned above to collect data regarding the H ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents