Saturday, September 9, 2017

What are the five steps of ethical hacking?

1. What are the five steps of ethical hacking?
Quais são as cinco etapas do processo de Ethical Hacker ou hacking ético?
1—Reconnaissance
2—Scanning
3—Enumeration 
4—Compromise 
5—Post-attack
2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What
services were running on those ports?
21- ftp
22-ssh
23-telnet
25-smtp
53-domain
80-http
111- rpcbind
139-netbios-ssn
445-netbios-ssn
512-exec
513-login
514-shell
1099-java-rmi
1524-shell
2049-nfs
2121-ftp
3306-mysql
5432-postgresql
5900-vnc
6000-x11
6667-irc
8009-tcp/udp
3. What step in the hacking attack process uses Zenmap?
Step One- Reconnaissance
4. What step in the hacking attack process identifies known vulnerabilities?
Step two- Scanning
5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system.
What was the name of the vulnerable service?
It was  vsftpd
6. If you are a member of a security penetration testing team, and you identify vulnerabilities and
exploits, should you obtain written permission from the owners prior to compromising and
exploiting the known vulnerability?
Se você é um membro de uma equipe de testes de penetração de segurança e você identifica vulnerabilidades e explorações, você deve obter permissão por escrito dos proprietários antes de comprometer e explorar a vulnerabilidade conhecida?
Yes, you should absolutely get permission from the owners prior to exploiting the known vulnerabilities.

No comments:

Post a Comment

Remote Hybrid and Office work