For Dummies 978-0-470-55093-9 Fiche technique Page 14

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 16
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 13
22
Part I: Building the Foundation for Ethical Hacking
Executing the plan
Good ethical hacking takes persistence. Time and patience are important. Be
careful when you’re performing your ethical hacking tests. A hacker in your
network or a seemingly benign employee looking over your shoulder might
watch what’s going on and use this information against you or your business.
Making sure that no hackers are on your systems before you start isn’t prac-
tical. Be sure you keep everything as quiet and private as possible. This is
especially critical when transmitting and storing your test results. If possible,
encrypt any e-mails and files containing sensitive test information by using
Pretty Good Privacy (PGP) (www.pgp.com), encrypted Zip file, or similar
technology.
You’re now on a reconnaissance mission. Harness as much information as
possible about your organization and systems, much like malicious hackers
do. Start with a broad view and narrow your focus:
1. Search the Internet for your organization’s name, your computer and
network system names, and your IP addresses.
Google is a great place to start.
2. Narrow your scope, targeting the specific systems you’re testing.
Whether you’re assessing physical security structures or Web applica-
tions, a casual assessment can turn up a lot of information about your
systems.
3. Further narrow your focus with a more critical eye. Perform actual scans
and other detailed tests to uncover vulnerabilities on your systems.
4. Perform the attacks and exploit any vulnerabilities you find, if that’s
what you choose to do.
Check out Chapter 4 to find out more information and tips on using this
process.
Evaluating results
Assess your results to see what you’ve uncovered, assuming that the vulner-
abilities haven’t been made obvious before now. This is where knowledge
counts. Your skill at evaluating the results and correlating the specific vulner-
abilities discovered will get better with practice. You’ll end up knowing your
systems much better than anyone else. This makes the evaluation process
much simpler moving forward.
Vue de la page 13
1 2 ... 9 10 11 12 13 14 15 16

Commentaires sur ces manuels

Pas de commentaire