It is one of the most important thing to do first u need to scan the target for vulnerabilities u need to know which ports are open and which are closed u can also determine the operating system the target is running
1 First step is to determine whether the system is alive or not it may seem a little lame but its worth it
for this my preferred tool is super scan 4.0 by foundstone and it is completely free
2 the 2nd thing to do is determining which ports are open and there is an excellent tool for that called nmap
u can use the command
nmap -sS (ip address of the victim)
it will tell you the status of all ports which are open and which are closed usually the juciest ports to watch out for are 21 22 53 80 110 139 143 and 443
3 determining the operating system it is a very important step as each system has its own vulnerabilities
4 nikto is a popular web server scanner and will scan for vulnerabilities www.cert.net/nikto2
1 First step is to determine whether the system is alive or not it may seem a little lame but its worth it
for this my preferred tool is super scan 4.0 by foundstone and it is completely free
2 the 2nd thing to do is determining which ports are open and there is an excellent tool for that called nmap
u can use the command
nmap -sS (ip address of the victim)
it will tell you the status of all ports which are open and which are closed usually the juciest ports to watch out for are 21 22 53 80 110 139 143 and 443
3 determining the operating system it is a very important step as each system has its own vulnerabilities
4 nikto is a popular web server scanner and will scan for vulnerabilities www.cert.net/nikto2
No comments:
Post a Comment