Now, which of the following tasks should he perform next?

Last Updated on February 8, 2022 by Admin 3

Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. In order to do so, he performs the following steps of the preattack phase successfully:

• Information gathering
• Determination of network range
• Identification of active systems
• Location of open ports and applications 

Now, which of the following tasks should he perform next?

  • Install a backdoor to log in remotely on the We-are-secure server.
  • Map the network of We-are-secure Inc.
  • Fingerprint the services running on the we-are-secure network.
  • Perform OS fingerprinting on the We-are-secure network. 
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments