Skip to main content

What did the others see? - 10

 By first looking at the vulnerabilities of the system you need to test, you can better understand What a potential criminal hacker might see from the outside. To do this, you need to look at what kind of Whenever someone uses your network, your system will leave a trail.

You can collect these footprints by doing the following:

1. Search online for the organization you work for. If you are performing a test on Your personal system, search for items relevant to you.

2. Detect possible open ports or run a complete network scan to determine specific system reports Outsiders may see your device. Since you have the system you want to test, you can Use local port scanners and shared discovery tools available on Windows, such as LANguard or GFI.

After that, you can perform more specific searches online. Try to find the following:

1. Patent or trademark

2. SEC documents

3. Acquisitions and previous mergers

4. Press releases about the most important purchases and changes in your organization

5. Point to the contact information of organization members or employees. You can immediately

Conduct background checks on the following websites:


                 1. USSeach

                 2. ChoicePoint

                 3. ZabaSearch


6. Company registration documents. You can use commercial websites to search for this content, such as


www.sec.gov/edgar.shtml (Display documents of listed companies) This is a tip: if you can’t find the information you are looking for, or if you want to learn more A simple keyword search website to perform advanced web searches. For example, if you want to find Files on a specific website, you can use these strings

Website: www. (domain).com (keyword or filename)-search for a specific file on a specific file website

filetype: SWF (company)_(name)-Search for Flash files that may be decompiled Access encrypted information

Now that you know what others think about the content you are trying to protect online, it’s time You begin to map the network and look for potential vulnerabilities in the system.






Comments