On this material we will learn a technique that should be done by a network security. Here is the structure of the technique to be performed

House Keeping
rootkit
Backdor
============
Exploit
Access vulnerability
Enumeration Services
information Gathering


We start from the Information Gathering.
In this part of the Information Gathering here we are still looking for looking for all the information of the target that we want to attack.

Gathering information in there are 2 techniques that can be done. Here is a picture.


IG    --- Technical --- Active --- directly to the server
                             --- Passive --- of data packets sent
       ----------------------------------------------------------------------------
        --- Non techniques --- Social Engineer
        --- look rubbish

Technics Active: during the collection of data directly in the attack is a server / target. not through intermediaries others.

Passive techniques: a technique of data collection by tapping the network is being bypassed by the target. Eg using wireshark, Cain n Able, etc.

non Technical
Social engineer: a technique that attacks the most dangerous of all. because with this technique menggukan someone will be able to pass through the structure at the top of the earlier techniques. Case in point:

Wahono company is an Admin section. There was a worker, a close friend wahono (he is a hacker) play to wahono. The purpose of the Friends wahono eg Lemu is taking root in the company right ases wahono. because a close friend wahono let the Lemu to play diruangannya (non admin). Lemu because the admin has entered the room, then it is. he immediately planted rootkit completed.

Leave a Reply