Week 4

On our fourth session on ethical hacking and penetration testing, our main topic was about target discovery. We were expected to apply the tools that we were introduced to identify the target machine, we were also introduced to the tools that could perform fingerprinting, and also generalize the things that we found during the target discovery. We were taught about the differences between fingerprinting and footprinting, and what results do we get when we perform either fingerprinting or footprinting. We were also taught how to find old files that were once stored on the internet, and some old records or even websites that were once active.

Category: Uncategorized
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>