First of all I would like to wish Happy Birthday to Hacking Truths which is celebrating its second successful year on web, & you can win great prizes check out our special contest details here.
So lets get back on the hacking thing, as we discussed about how you can get information about your victim with the help of Passive Attack Gathering. Now what you have to do with this information ? The next step is known as Network Mapping.
But, Case is reverse in Black Box Testing, Ethical hacker is kept a way outside the organization & he could not even gett that details directly. So what he do is first perform passive attack gathering & collect some information, then he arranges all the information in particular order so as to predict the hierarchy of the network.
You may ask that if organizations are paying highly to ethical hacker, why they don’t directly provide information ? But actually, when any criminal try to penetrate the network, he do not know anything about them. So, results of Black box are more satisfactory to find out all the vulnerabilities.
0 comments:
Post a Comment