Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

l'analyse de donnée

scanning - detective
enumeration

les 3 phases

A) Les phases de pré_attaques


1- Information gathering
- Footprinting
- fingerprinting
- passive reconnaissance
2- detecting live system
- sacanning
- active reconnaissance
3- Enumeration
usename, password, share, etc

4- Vulnerability management
- Vulnerability scanning
- Vulnerability Analysis

B) Gaining Acces ( Exploitation )


Success No Success
C) Post-Exploitation D) DoS/DDoS
1. Maintining Access
2. Esclate Privileges
3. Cover Tracks
les phases de pré_attaques 1.2.3 vont nous permettre :

- OS
-services run-time ( TCP ou/et UDP )
-version service
-username
- password hash
-Email
-etc...

vulnerabilité = faiblesse

-- Know vulnerability : CVE cve.mitre.org


CVE-AAAA-Number
--- Know weakness: CWE cwe.mitre.org

You might also like