unit 3 hs pdf
unit 3 hs pdf
1.Social Engineering
Social engineering exploits human psychology to manipulate individuals into divulging
sensi ve informa on, gran ng unauthorized access, or performing certain ac ons.
Emails
2.Bai ng
Use physical media (e.g., USB drives) with malicious payloads and leave them in high-
traffic areas.
Online variants include fake download links for popular so ware or content.
3. Pretex ng
Impersonate someone with authority (e.g., IT support, HR, or a vendor).
Ask for sensi ve informa on under the guise of legi mate work.
2. Physical Security
Exploit physical vulnerabili es to gain unauthorized access to systems, facili es, or sensi ve
assets.
1.Cloning Access Cards
Use cloning devices to duplicate employee access cards.
Exploit poorly configured or outdated systems.
2.Surveillance
Observe access points, security patrols, and camera placements.
Map out high-value areas and weak entry points.
3. Internet Reconnaissance
Gather publicly available informa on to iden fy vulnerabili es and understand the target's
digital footprint.
1.DNS or IP Lookups
2.Website Analysis
Examine website content, comments, and metadata for sensi ve informa on.
Tools: Burp Suite, Wappalyzer, HTTrack.
3. Network Scanning
Iden fy live hosts, open ports, and services.
Tools: Nmap, Shodan, Censys.
Enumera on
Enumera on is a key phase in ethical hacking and penetra on
tes ng. It involves gathering detailed informa on about a
target system or network to iden fy poten al vulnerabili es.
The goal of enumera on is to establish an ac ve connec on
with the target and collect as much informa on as possible,
including usernames, group memberships, shares, and
network resources.
1. Network Enumera on
Tools Used: Nmap, Netdiscover, Angry IP Scanner
Purpose: Iden fy live hosts, open ports, and services
running on the target network.
Techniques:
o Scanning IP ranges to find ac ve hosts.
o Iden fying open ports and the services associated
with them.
o Discovering opera ng systems and network
devices.
2. Port Scanning
Port Scanning is the process of probing a network or system
to iden fy open ports and the services running on them. It
helps determine the security posture of a target by revealing
poten al entry points.
Elements of Enumera on
1. Live Hosts: Iden fy which machines are ac ve.
2. Open Ports: Understand the a ack surface by finding
exposed services.
3. Running Services: Determine which applica ons or
protocols are running on open ports.
4. OS Fingerprin ng: Iden fy opera ng systems to tailor
exploits.
5. Usernames: Enumerate valid users for password a acks.
6. Network Shares: Look for shared resources that may
reveal sensi ve data.
7. Configura ons and Policies: Find misconfigura ons or
default se ngs.
8. Vulnerabili es: Match services and so ware versions
with known exploits.