SlideShare a Scribd company logo
1 of 1
Download to read offline
Phase 2. Identify Targets and Run Scans Goal: Identify the tools and techniques to be used to
perform host discovery and enumeration. Procedure: List out the tools you plan on using to
perform network scans, the purpose for using them, and how you will use them. For example: 1.
Tool: Nmap. Purpose: Obtain information on hosts and the services and operating systems they
are running. Commands: Deliverable: Provide a minimum 2-page description of the tools you
plan on using for the network scans, your reasoning for selecting them, and how they will be
used. Be sure to include any challenges and potential drawbacks or Network scanning will be
performed by utilizing the following 5 tools -
Nmap: Offer comprehensive network scanning capabilities. -Masscan: Ideal for swift scans
across large networks. -Wireshark: Essential for detailed packet-level analysis. -Nikto:
Specialized in web server vulnerability identification -Nessus/OpenVAS: Provides through
vulnerability assessment.

More Related Content

Similar to Phase 2. Identify Targets and Run Scans Goal Identify the tools and.pdf

Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptxCyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptxBoston Institute of Analytics
 
Goal- Identify the tools and techniques to be used to scan for vulnera.pdf
Goal- Identify the tools and techniques to be used to scan for vulnera.pdfGoal- Identify the tools and techniques to be used to scan for vulnera.pdf
Goal- Identify the tools and techniques to be used to scan for vulnera.pdfaaicommunication34
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning projectRishu Seth
 
Nessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdfNessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdffckindswear
 
Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Harsh Desai
 
Software for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdfSoftware for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdfBytecode Security
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration toolsJenishChauhan4
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docxLaticiaGrissomzz
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2CFabrizio Farinacci
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESIRJET Journal
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsxSuman Garai
 
Nmap basics
Nmap basicsNmap basics
Nmap basicsitmind4u
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far AlleneMcclendon878
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Yoram Orzach
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring toolsKUNDAN KUMAR
 

Similar to Phase 2. Identify Targets and Run Scans Goal Identify the tools and.pdf (20)

Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptxCyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
 
Goal- Identify the tools and techniques to be used to scan for vulnera.pdf
Goal- Identify the tools and techniques to be used to scan for vulnera.pdfGoal- Identify the tools and techniques to be used to scan for vulnera.pdf
Goal- Identify the tools and techniques to be used to scan for vulnera.pdf
 
Nmap
NmapNmap
Nmap
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
 
Nessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdfNessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdf
 
Network scan
Network scanNetwork scan
Network scan
 
Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3Nmap basics-1198948509608024-3
Nmap basics-1198948509608024-3
 
Software for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdfSoftware for Finding vulnerabilities in programs.pdf
Software for Finding vulnerabilities in programs.pdf
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration tools
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2C
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 

More from farankureshi

options Alessia belongs to a high-context culture, and Maarten be.pdf
options Alessia belongs to a high-context culture, and Maarten be.pdfoptions Alessia belongs to a high-context culture, and Maarten be.pdf
options Alessia belongs to a high-context culture, and Maarten be.pdffarankureshi
 
Part 3 Installation and Configuration .pdf
Part 3 Installation and Configuration                                .pdfPart 3 Installation and Configuration                                .pdf
Part 3 Installation and Configuration .pdffarankureshi
 
options long words leave an impression of grandeur that complemen.pdf
options long words leave an impression of grandeur that complemen.pdfoptions long words leave an impression of grandeur that complemen.pdf
options long words leave an impression of grandeur that complemen.pdffarankureshi
 
options Please use the attached form to indicate any changes in y.pdf
options Please use the attached form to indicate any changes in y.pdfoptions Please use the attached form to indicate any changes in y.pdf
options Please use the attached form to indicate any changes in y.pdffarankureshi
 
Part 1 As part of your role as the controller for Lynbrook, Inc., yo.pdf
Part 1 As part of your role as the controller for Lynbrook, Inc., yo.pdfPart 1 As part of your role as the controller for Lynbrook, Inc., yo.pdf
Part 1 As part of your role as the controller for Lynbrook, Inc., yo.pdffarankureshi
 
ONLY NEED THE FINAL SLIDES - single step income statement The follo.pdf
ONLY NEED THE FINAL SLIDES - single step income statement  The follo.pdfONLY NEED THE FINAL SLIDES - single step income statement  The follo.pdf
ONLY NEED THE FINAL SLIDES - single step income statement The follo.pdffarankureshi
 
p(pq)(pq)(pq)�(pq)�q.pdf
p(pq)(pq)(pq)�(pq)�q.pdfp(pq)(pq)(pq)�(pq)�q.pdf
p(pq)(pq)(pq)�(pq)�q.pdffarankureshi
 
One of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdf
One of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdfOne of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdf
One of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdffarankureshi
 
Overview This assignment is to be implemented using object-oriented pr.pdf
Overview This assignment is to be implemented using object-oriented pr.pdfOverview This assignment is to be implemented using object-oriented pr.pdf
Overview This assignment is to be implemented using object-oriented pr.pdffarankureshi
 
Our topic this week is emotions and moods. Emotions are short-lived fe.pdf
Our topic this week is emotions and moods. Emotions are short-lived fe.pdfOur topic this week is emotions and moods. Emotions are short-lived fe.pdf
Our topic this week is emotions and moods. Emotions are short-lived fe.pdffarankureshi
 
On January 12, 2023, Desmond Doss a professional engineer, moved from .pdf
On January 12, 2023, Desmond Doss a professional engineer, moved from .pdfOn January 12, 2023, Desmond Doss a professional engineer, moved from .pdf
On January 12, 2023, Desmond Doss a professional engineer, moved from .pdffarankureshi
 
Please code in C++ and do only the �TO DO�s and all of them. There a.pdf
Please code in C++ and do only the �TO DO�s and all of them. There a.pdfPlease code in C++ and do only the �TO DO�s and all of them. There a.pdf
Please code in C++ and do only the �TO DO�s and all of them. There a.pdffarankureshi
 
Please answer the following questions in local municipality 1) Do .pdf
Please answer the following questions in local municipality 1) Do .pdfPlease answer the following questions in local municipality 1) Do .pdf
Please answer the following questions in local municipality 1) Do .pdffarankureshi
 
Please answer all questions below (Total10 marks)Input XInp.pdf
Please answer all questions below    (Total10 marks)Input XInp.pdfPlease answer all questions below    (Total10 marks)Input XInp.pdf
Please answer all questions below (Total10 marks)Input XInp.pdffarankureshi
 
Peter is the day-manager at a small proprietor-owned restaurant whic.pdf
Peter is the day-manager at a small proprietor-owned restaurant whic.pdfPeter is the day-manager at a small proprietor-owned restaurant whic.pdf
Peter is the day-manager at a small proprietor-owned restaurant whic.pdffarankureshi
 
PepsiCo As part of our project, we must include a section on the B.pdf
PepsiCo As part of our project, we must include a section on the B.pdfPepsiCo As part of our project, we must include a section on the B.pdf
PepsiCo As part of our project, we must include a section on the B.pdffarankureshi
 
Part 1 Describe the purpose of a Trial Balance and the steps of how.pdf
Part 1 Describe the purpose of a Trial Balance and the steps of how.pdfPart 1 Describe the purpose of a Trial Balance and the steps of how.pdf
Part 1 Describe the purpose of a Trial Balance and the steps of how.pdffarankureshi
 
Part of equation in Economics but I dont understand how it become P.pdf
Part of equation in Economics but I dont understand how it become P.pdfPart of equation in Economics but I dont understand how it become P.pdf
Part of equation in Economics but I dont understand how it become P.pdffarankureshi
 

More from farankureshi (18)

options Alessia belongs to a high-context culture, and Maarten be.pdf
options Alessia belongs to a high-context culture, and Maarten be.pdfoptions Alessia belongs to a high-context culture, and Maarten be.pdf
options Alessia belongs to a high-context culture, and Maarten be.pdf
 
Part 3 Installation and Configuration .pdf
Part 3 Installation and Configuration                                .pdfPart 3 Installation and Configuration                                .pdf
Part 3 Installation and Configuration .pdf
 
options long words leave an impression of grandeur that complemen.pdf
options long words leave an impression of grandeur that complemen.pdfoptions long words leave an impression of grandeur that complemen.pdf
options long words leave an impression of grandeur that complemen.pdf
 
options Please use the attached form to indicate any changes in y.pdf
options Please use the attached form to indicate any changes in y.pdfoptions Please use the attached form to indicate any changes in y.pdf
options Please use the attached form to indicate any changes in y.pdf
 
Part 1 As part of your role as the controller for Lynbrook, Inc., yo.pdf
Part 1 As part of your role as the controller for Lynbrook, Inc., yo.pdfPart 1 As part of your role as the controller for Lynbrook, Inc., yo.pdf
Part 1 As part of your role as the controller for Lynbrook, Inc., yo.pdf
 
ONLY NEED THE FINAL SLIDES - single step income statement The follo.pdf
ONLY NEED THE FINAL SLIDES - single step income statement  The follo.pdfONLY NEED THE FINAL SLIDES - single step income statement  The follo.pdf
ONLY NEED THE FINAL SLIDES - single step income statement The follo.pdf
 
p(pq)(pq)(pq)�(pq)�q.pdf
p(pq)(pq)(pq)�(pq)�q.pdfp(pq)(pq)(pq)�(pq)�q.pdf
p(pq)(pq)(pq)�(pq)�q.pdf
 
One of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdf
One of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdfOne of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdf
One of Mr. D.I.Y.�s substantial shareholders, Employees Provident Fu.pdf
 
Overview This assignment is to be implemented using object-oriented pr.pdf
Overview This assignment is to be implemented using object-oriented pr.pdfOverview This assignment is to be implemented using object-oriented pr.pdf
Overview This assignment is to be implemented using object-oriented pr.pdf
 
Our topic this week is emotions and moods. Emotions are short-lived fe.pdf
Our topic this week is emotions and moods. Emotions are short-lived fe.pdfOur topic this week is emotions and moods. Emotions are short-lived fe.pdf
Our topic this week is emotions and moods. Emotions are short-lived fe.pdf
 
On January 12, 2023, Desmond Doss a professional engineer, moved from .pdf
On January 12, 2023, Desmond Doss a professional engineer, moved from .pdfOn January 12, 2023, Desmond Doss a professional engineer, moved from .pdf
On January 12, 2023, Desmond Doss a professional engineer, moved from .pdf
 
Please code in C++ and do only the �TO DO�s and all of them. There a.pdf
Please code in C++ and do only the �TO DO�s and all of them. There a.pdfPlease code in C++ and do only the �TO DO�s and all of them. There a.pdf
Please code in C++ and do only the �TO DO�s and all of them. There a.pdf
 
Please answer the following questions in local municipality 1) Do .pdf
Please answer the following questions in local municipality 1) Do .pdfPlease answer the following questions in local municipality 1) Do .pdf
Please answer the following questions in local municipality 1) Do .pdf
 
Please answer all questions below (Total10 marks)Input XInp.pdf
Please answer all questions below    (Total10 marks)Input XInp.pdfPlease answer all questions below    (Total10 marks)Input XInp.pdf
Please answer all questions below (Total10 marks)Input XInp.pdf
 
Peter is the day-manager at a small proprietor-owned restaurant whic.pdf
Peter is the day-manager at a small proprietor-owned restaurant whic.pdfPeter is the day-manager at a small proprietor-owned restaurant whic.pdf
Peter is the day-manager at a small proprietor-owned restaurant whic.pdf
 
PepsiCo As part of our project, we must include a section on the B.pdf
PepsiCo As part of our project, we must include a section on the B.pdfPepsiCo As part of our project, we must include a section on the B.pdf
PepsiCo As part of our project, we must include a section on the B.pdf
 
Part 1 Describe the purpose of a Trial Balance and the steps of how.pdf
Part 1 Describe the purpose of a Trial Balance and the steps of how.pdfPart 1 Describe the purpose of a Trial Balance and the steps of how.pdf
Part 1 Describe the purpose of a Trial Balance and the steps of how.pdf
 
Part of equation in Economics but I dont understand how it become P.pdf
Part of equation in Economics but I dont understand how it become P.pdfPart of equation in Economics but I dont understand how it become P.pdf
Part of equation in Economics but I dont understand how it become P.pdf
 

Recently uploaded

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 

Recently uploaded (20)

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 

Phase 2. Identify Targets and Run Scans Goal Identify the tools and.pdf

  • 1. Phase 2. Identify Targets and Run Scans Goal: Identify the tools and techniques to be used to perform host discovery and enumeration. Procedure: List out the tools you plan on using to perform network scans, the purpose for using them, and how you will use them. For example: 1. Tool: Nmap. Purpose: Obtain information on hosts and the services and operating systems they are running. Commands: Deliverable: Provide a minimum 2-page description of the tools you plan on using for the network scans, your reasoning for selecting them, and how they will be used. Be sure to include any challenges and potential drawbacks or Network scanning will be performed by utilizing the following 5 tools - Nmap: Offer comprehensive network scanning capabilities. -Masscan: Ideal for swift scans across large networks. -Wireshark: Essential for detailed packet-level analysis. -Nikto: Specialized in web server vulnerability identification -Nessus/OpenVAS: Provides through vulnerability assessment.