• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week #3 Reading Discussions

September 4, 2020 by Mei X Wang 1 Comment

Using Open Source Reconnaissance Tools for Business Partner Vulnerability Assessment

  • Using a Google search of “intitle:index.of “Apache 2.2.22at “, we can find all servers using that version of Apache. When you attach a site name, all the possible queries showing vulnerable software or sensitive information (password, scans, files) can be found. This can be done using any search engine.
  • If flagged, Google can prompt you to answer the captcha puzzle, Google can also freeze all search activity on your network if Google decides there’s a botnet on the server.

 

What software can be used to test sites against malware/spam?

What tools can be used to non-intrusively perform a vulnerability assessment?

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Anthony Messina says

    September 12, 2020 at 8:12 am

    Shodan and Google searches are excellent choices to perform initial vulnerability assessments. These tools are lightweight and are not very noisy. By noisy I mean they generally will not leave any evidence in the servers web logs or get picked up by a SIEM as they are not actively scanning. Port scanners such as Nmap will leave web logs and OpenVAS, which is vulnerability scanner will generally create an alarm in the company’s SIEM appliance.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in