Ethical Hacking — Week 2
Target Scoping & Information
Gathering
In today’s session I learned about target scoping and information gathering.I used web tools for footprinting, learned more about competitive intelligence and described DNS zone transfers.
There are several steps in target scoping, first is gathering client requirements then preparing the test plan then profiling test boundaries then defining business objectives then finally project management & scheduling.
I also learned about analysis a company’s website. One of the tools to do this is called Burp Suite. Burp Suite is a powerful tool.
I also learned about setting up Burp Suite Proxy. In order to redirect traffic to Burp Suite,
- 1.Click proxy-> intercept is on
- 2.Click options -> proxy listeners set as default
- 3.Open browser
- 4.Click options in browser
- 5.Set proxy as Burp Suite setting
- 6.Enable Proxy for all protocols in browser
I also learned about other Footprinting tools. For example, Whois, which is a commonly used tool and Host command and SamSpade and Greenwich.
Tags: Ethical Hacking
This entry was posted on Friday, February 28th, 2020 at 4:23 pm and is filed under Database System -- Semester 3, Ethical Hacking -- Semester 4, Intelligent System -- Semester 4, Network Forensic -- Semester 5, Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.