Understand a range of ethical hacking tools and techniques.
Tools (hardware and software) and techniques:
Physical: (i.e. environment, building, IT infrastructure): public records, satellite images, cameras, binoculars, specialised hardware (e.g., Pwn Phone, Plugbot), wireless sniffers (War Driving), VOIP (War Dialing), Bluetooth scanners , dumpster diving, RF scanners, drones.
Logical: (i.e., operating system, software and configuration): port Scanners (NMAP, Angry IP Scanner, NetScanTools), Sniffers (Snort), password crackers (Cain & Abel, THC Hydra, John the Ripper) , vulnerability scanners (Nessus, Nikto), wireless networks (Kismet, KisMac, NetStumbler), website (BurpSuite), generalist (Metasploit, Wapiti), forensic analysis.
Social: identify theft/spoofing (Piggybacking), shoulder surfing, pretexting, baiting, human intelligence gathering, deception.
Assessment Criteria
-
2.1
Compare different ethical hacking tools and techniques used to identify weaknesses in a system from a physical, logical and social perspective.