Monday, 1 August 2011

Mapping The Network Of A Victim Organization


Mapping The Network Of A Victim OrganizationFirst of all I would like to wish Happy Birthday to Hacking Truths which is celebrating its second successful year on web, & you can win great prizes check out our special contest details here.
So lets get back on the hacking thing, as we discussed about how you can get information about your victim with the help of Passive Attack Gathering. Now what you have to do with this information ? The next step is known as Network Mapping.
While performing White Box, The ethical hackers know about how network is managed, how it is organized all the little details are also known to ethical hacker, who is performing the penetration testing on the victim network.
But, Case is reverse in Black Box Testing, Ethical hacker is kept a way outside the organization & he could not even gett that details directly. So what he do is first perform passive attack gathering & collect some information, then he arranges all the information in particular order so as to predict the hierarchy of the network.
He collects more & more information about the network as follows:
The operating systems installed on network & server
More information on network administrator & security persons
Vulnerable software installed on network
Firewalls , how they are used & how many ?
Topology of the network.
Security architecture of network.
You may ask that if organizations are paying highly to ethical hacker, why they don’t directly provide information ? But actually, when any criminal try to penetrate the network, he do not know anything about them. So, results of Black box are more satisfactory to find out all the vulnerabilities.
Now after arranging all the things in sequence, ethical hacker tries to break in network & find security holes, if he fails in first attempt, he changes his network map. & if he succeeds he proceeds to next hole. So by this way with trial & error he keeps entering the networks or changing his network map till he succeeds.
Mapping of Network need very much information in penetration, it is not the game for newbie, nut still you have to start somewhere, & starting with your own small network is not a bad idea, isn’t it ?

All Rights Reserved Hacking Tricks | Blogger Template by Bloggermint
Sponsored by Florida Phone Book, Florida Accountants, Optician Jobs