Skip to main content

Network and Systems Hardening

Network hardening Make sure your firewall is correctly configured, that all rules are periodically reviewed, that remote access points and users are secure, that any open network ports are blocked, that extraneous protocols and services are disabled and removed, that access lists are in place, and that network data is encrypted. Systems Hardening Audit your current systems: Conduct a thorough audit of your current technologies (you can use). To identify system weaknesses and order remedies, use security auditing techniques like configuration management, vulnerability scanning, and penetration testing. Utilize industry standards from NIST, Microsoft, CIS, DISA, and other sources to conduct system hardening assessments against resources. Create a strategy for systems hardening: Not every system needs to be hardened at once. Instead, develop a strategy and plan based on the risks found in your IT ecosystem, and then utilize a staged approach to fix the most serious issues. Patch ...

Footprinting and Reconnaissance

 Active and passive reconnaissance are the two primary categories. Active reconnaissance involves hackers interacting with the computer system directly in an effort to gather information using methods including manual testing, automated scanning, and  example tools as follows, 

Footprinting and Reconnaissance Tools 

Email tracking tools -eMailTrackerPro

Footprinting Tools - FOCA, Maltego , Metasploit , netscantools pro , OSR Framework , Recon-ng , SearchDiggity , the Harvester

Finding Domain and Sub-domainSublist3r

Traceroute - Path Analyzer Pro

Web Spider - Web data extractor

Web site mirroring -Httrack Website copier

Whois Lookup Tools - SmartWhois




Site mirroring 


Path Analyzer Pro
 





Smartwhois








Comments

Popular posts from this blog