Hacking Phase 2 - Scanning

Phase 2 - Scanning

    *

      Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.
    *

      Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.
    *

      Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.


0 comments to "Hacking Phase 2 - Scanning"

Post a Comment

Total Pageviews

Followers