Temple University

Week 5 reading and article

Reading Summary: Enumeration is a powerful to which allows you to identify valid user accounts or any weak components at a target.    One of the first activities while conducting a penetration test in Unix environments is to perform a user enumeration in order to discover valid usernames.  There are several pieces of information that can be gathered by utilizing services standard tool available in Windows and Unix.  Footprinting is a commonly used practice utilized by hackers to asses a companies capabilities.  Performing reconnaissance on the company is a key tactic in identifying the company’s security weaknesses this can be utilized by the Penn Tester as well to defend against attacks. 

This article centers around the recent outbreak of Malware in the App Store which was targeting applications utilized in Asian countries.

http://www.databreachtoday.com/apple-battles-app-store-malware-outbreak-a-8538#

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *