
- External Approach
- With some prior knowledge
- Without prior knowledge
-
- Internal Approach
- With some prior knowledge
- With deep knowledge
-
- Footprinting / Information Gathering phase
- Discovery and Planning / Information Analysis phase
- Detecting a vulnerability / security loophole
- Attack / Penetration / Compromise
- Analysis of security posture / Cover up / Report
- Clean up
- successful attack - when the objective is met within the scope of the attack
- a partial success - when there has been a compromise, but not enough to achieve the objective
- a failure - when the systems have been found to be robust to the attack methodology adopted
- Client site intelligence
- Infrastructure fingerprinting
- Network discovery and Access point discovery
- Target Identification
- Resource and Effort Estimation
- Modeling the Attack strategy (s)
- Relationship Analysis
- Vulnerability Analysis
- Scanning
- Enumeration
- Zeroing the target
- Exploring viable exploits (new / created / present)
- Executing the attack / Alternate attack strategy
- Target penetration
- Escalating the attack
- Consolidation of attack information
- Analysis and recommendations
- Presentation and deliverables
- Clean up tasks and procedures
- Restoring security posture
Download Here:
http://www.ziddu.com/download/13121682/Ethical_Hacking_and_Countermeasures_EC_Council_Exam_312_50_.rar.html