Submit Search
Upload
Pentest: footprinting & scan
•
2 likes
•
201 views
J
JUNIOR SORO
Follow
PENTEST PRESENTATION : FOOTPRINTING AND SCAN #CyberSecurity #Learn-IT
Read less
Read more
Technology
Report
Share
Report
Share
1 of 14
Download now
Download to read offline
Recommended
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
Yuval Sinay, CISSP, C|CISO
Sophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent Security
Priyanka Aash
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
Global Micro Solutions
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
Vladyslav Radetsky
Removable Disk Hacking for Fun and Profit
Removable Disk Hacking for Fun and Profit
Rungga Reksya Sabilillah
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Lancope, Inc.
Shadow IT
Shadow IT
Risk Analysis Consultants, s.r.o.
Gunadarma workshop security
Gunadarma workshop security
Rungga Reksya Sabilillah
Recommended
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
Yuval Sinay, CISSP, C|CISO
Sophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent Security
Priyanka Aash
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
Global Micro Solutions
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
Vladyslav Radetsky
Removable Disk Hacking for Fun and Profit
Removable Disk Hacking for Fun and Profit
Rungga Reksya Sabilillah
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Combating Advanced Persistent Threats with Flow-based Security Monitoring
Lancope, Inc.
Shadow IT
Shadow IT
Risk Analysis Consultants, s.r.o.
Gunadarma workshop security
Gunadarma workshop security
Rungga Reksya Sabilillah
How to assign a CVE to yourself?
How to assign a CVE to yourself?
Ramin Farajpour Cami
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
Sedthakit Prasanphanich
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
F _
Penetration and hacking training brief
Penetration and hacking training brief
Bill Nelson
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Luigi Delgrosso
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
Peter Wood
Network Attack and Intrusion Prevention System
Network Attack and Intrusion Prevention System
Deris Stiawan
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
MITRE - ATT&CKcon
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
leonardjonh145
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
BGA Cyber Security
Network security
Network security
سودان وب لأمن المعلومات
Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
Security protection On banking systems using ethical hacking.
Security protection On banking systems using ethical hacking.
Rishabh Gupta
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
NowSecure
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Brian Kelly
Secure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
Sebastien Gioria
IPS Best Practices
IPS Best Practices
Heather Axworthy
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
ITpreneurs
The Next Generation Security
The Next Generation Security
Cybera Inc.
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
ecmee
Demo intelligent user experience with oracle mobility for publishing
Demo intelligent user experience with oracle mobility for publishing
Vasily Demin
Oracle Management Cloud
Oracle Management Cloud
Fabio Batista
More Related Content
What's hot
How to assign a CVE to yourself?
How to assign a CVE to yourself?
Ramin Farajpour Cami
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
Sedthakit Prasanphanich
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
F _
Penetration and hacking training brief
Penetration and hacking training brief
Bill Nelson
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Luigi Delgrosso
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
Peter Wood
Network Attack and Intrusion Prevention System
Network Attack and Intrusion Prevention System
Deris Stiawan
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
MITRE - ATT&CKcon
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
leonardjonh145
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
BGA Cyber Security
Network security
Network security
سودان وب لأمن المعلومات
Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
Security protection On banking systems using ethical hacking.
Security protection On banking systems using ethical hacking.
Rishabh Gupta
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
NowSecure
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Brian Kelly
Secure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
Sebastien Gioria
IPS Best Practices
IPS Best Practices
Heather Axworthy
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
ITpreneurs
The Next Generation Security
The Next Generation Security
Cybera Inc.
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
ecmee
What's hot
(20)
How to assign a CVE to yourself?
How to assign a CVE to yourself?
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Penetration and hacking training brief
Penetration and hacking training brief
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
Network Attack and Intrusion Prevention System
Network Attack and Intrusion Prevention System
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
Csc520 you are a senior level employee and you must tailor your deliverables ...
Csc520 you are a senior level employee and you must tailor your deliverables ...
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
Network security
Network security
Advanced persistent threat (apt)
Advanced persistent threat (apt)
Security protection On banking systems using ethical hacking.
Security protection On banking systems using ethical hacking.
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Secure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
IPS Best Practices
IPS Best Practices
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
The Next Generation Security
The Next Generation Security
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
Similar to Pentest: footprinting & scan
Demo intelligent user experience with oracle mobility for publishing
Demo intelligent user experience with oracle mobility for publishing
Vasily Demin
Oracle Management Cloud
Oracle Management Cloud
Fabio Batista
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
Marco Gralike
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout Session
Splunk
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
Dr. Wilfred Lin (Ph.D.)
Jfokus 2017 Oracle Dev Cloud and Containers
Jfokus 2017 Oracle Dev Cloud and Containers
Mika Rinne
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Carl Blume
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Government Technology and Services Coalition
Oracle Management Cloud - HybridCloud Café - May 2016
Oracle Management Cloud - HybridCloud Café - May 2016
Bastien Leblanc
Oracle Cloud Café hybrid Cloud 19 mai 2016
Oracle Cloud Café hybrid Cloud 19 mai 2016
Sorathaya Sirimanotham
BGOUG 2014 Decrease Your MySQL Attack Surface
BGOUG 2014 Decrease Your MySQL Attack Surface
Georgi Kodinov
Ch07.ppt
Ch07.ppt
ImXaib
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
Survey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
20190615 hkos-mysql-troubleshootingandperformancev2
20190615 hkos-mysql-troubleshootingandperformancev2
Ivan Ma
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
Olivier DASINI
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
10 Razões para Usar MySQL em Startups
10 Razões para Usar MySQL em Startups
MySQL Brasil
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Lancope, Inc.
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard
Similar to Pentest: footprinting & scan
(20)
Demo intelligent user experience with oracle mobility for publishing
Demo intelligent user experience with oracle mobility for publishing
Oracle Management Cloud
Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
eProseed Oracle Open World 2016 debrief - Oracle Management Cloud
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout Session
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
Jfokus 2017 Oracle Dev Cloud and Containers
Jfokus 2017 Oracle Dev Cloud and Containers
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Oracle Management Cloud - HybridCloud Café - May 2016
Oracle Management Cloud - HybridCloud Café - May 2016
Oracle Cloud Café hybrid Cloud 19 mai 2016
Oracle Cloud Café hybrid Cloud 19 mai 2016
BGOUG 2014 Decrease Your MySQL Attack Surface
BGOUG 2014 Decrease Your MySQL Attack Surface
Ch07.ppt
Ch07.ppt
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Survey Presentation About Application Security
Survey Presentation About Application Security
20190615 hkos-mysql-troubleshootingandperformancev2
20190615 hkos-mysql-troubleshootingandperformancev2
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
10 Razões para Usar MySQL em Startups
10 Razões para Usar MySQL em Startups
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Recently uploaded
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
vincent683379
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
CzechDreamin
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
Jennifer Lim
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
Femke de Vroome
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
ScyllaDB
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
GDSC PJATK
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
CzechDreamin
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
UXDXConf
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
UXDXConf
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
FIDO Alliance
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
FIDO Alliance
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
Samy Fodil
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
FIDO Alliance
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
marcuskenyatta275
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
CzechDreamin
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
UXDXConf
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
Patrick Viafore
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
CzechDreamin
Recently uploaded
(20)
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
Pentest: footprinting & scan
1.
Footprinting and Scan
in Pentest P r e s e n t e d b y S O R O JUNIOR SORO E-mail: soronijunior@gmail.com
2.
Copyright © 2016,
Oracle and/or its affiliates. All rights reserved. | 2 1. What is Pentest ? 2. What is Footprinting ? 3. What is Scan ? Plan 2
3.
Copyright © 2015,
Oracle and/or its affiliates. All rights reserved. | 3
4.
Penetration Test 4 1 . W
h a t i s P e n t e s t ?
5.
Copyright © 2015,
Oracle and/or its affiliates. All rights reserved. | 5
6.
Copyright © 2015,
Oracle and/or its affiliates. All rights reserved. | Reduce Attack area after the footprinting Find vulnerabili ties and exploits on network, system Determine the operating system used, plateform running, web server versions.. Identifying various ways in organisation network system Process of collecting as much information as possible Oracle Confidential – Internal/Restricted/Highly Restricted 6 3 2 . W h a t i s Fo o t p r i n t i n g ? 6
7.
Copyright © 2015,
Oracle and/or its affiliates. All rights reserved. | Reduce Attack area after the footprinting Find vulnerabili ties and exploits on network, system Determine the operating system used, plateform running, web server versions.. Identifying various ways in organisation network system Process of collecting as much information as possible Oracle Confidential – Internal/Restricted/Highly Restricted 7 3 Website Footprinting Email Footprinting 2 . W h a t i s Fo o t p r i n t i n g ? 6 Network Footprinting Social Ingineering Footprinting using Google Competitive intelligence WHOIS Footprinting DNS Footprinting Online Service of Footprinting TYPES OF FOOTPRINTING
8.
8 Footprinting Tools N E T
C R A F T 2 . W h a t i s Fo o t p r i n t i n g ? 8 N M A P B U R P S U I T E G O O G L E M A L T E G O S O C I A L N E T W O R K O T H E R
9.
Copyright © 2014
Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 98
10.
Copyright © 2014
Oracle and/or its affiliates. All rights reserved. |3 . W h a t i s S c a n ? live hosts, IP adress, Open ports, system architecture, Services running, vulnerabilities 10
11.
Copyright © 2017,
Oracle and/or its affiliates. All rights reserved. 11Confidential – Oracle Internal/Restricted/Highly Restricted 11Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Entreprises Data Base Network New Now Port Scan Network Scan Vulnerabilities Scan Other Scan TYPES OF SCAN 33 . W h a t i s S c a n ? 11
12.
Copyright © 2014
Oracle and/or its affiliates. All rights reserved. | Oracle Confidential 1 SCAN TOOLS 3 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 7 Simplify access to all Informations Quickly Govern and secure all ports, services 3 . W h a t i s S c a n ? Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 6 TOOLS – MORE USING Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | DO A GOOD SCAN BURP SUITEZAP NETSPARKER 12
13.
Copyright © 2014
Oracle and/or its affiliates. All rights reserved. | • TimeThank you for your 13 13 JUNIOR SORO E-mail: soronijunior@gmail.com
14.
Copyright © 2014
Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 14 Footprinting and Scan in Pentest P r e s e n t e d b y S O R O End JUNIOR SORO E-mail: soronijunior@gmail.com
Download now