Hacking Exposed Diagram
Hacking Exposed Diagram
Target address range and naming Open Source Search USENet, Search Engines, Edgar
Whois Any UNIX Client
acquisition and information gathering
Footprinting Web Interface to Whois http://www.networksolutions.com/cgi-
are estential to a surgical attack. The ARIN Whois bin/whois/whois
key here is not to miss any details. DNS Zone Transfer http://www.arin.net/whois
Enough data has been gathered at Password eavesdropping tcpdump, l0phtcrack, readsmb
this point to make an informed Gaining File Share Brute Forcing NAT, Legion
attempt to access the target. Access Password File Grab tftp, pwdump2 (NT)
Buffer Overflows ttdb, eEye, IISHack
procedures,
1. Inadequate router guidelines, and
Circ
LAN
through ICMP, IP
NetBIOS, and lead to
unauthorized access to
services on your DMZ
Servers.
Workstation
Branch Office
Tower box
11. Excessive trust 9. Software that is
2. Unsecured and relationships such as unpatched, outdated,
p
alu
Laptop computer