task 2 ppt
task 2 ppt
RECONISSANCE AND
SCANNING
-BY NUTHAN A
RECONAISSANCE AND SCANNING
1)Passive Foot printing: This method gathers information without directly interacting with the
target system. It involves searching for information online, such as on social media sites and
search engines.
Ex:Whois,netcraft
2)Active Foot printing: This method directly interacts with the target system to gather
information. It can be done manually or with automated, Active foot printing is more intrusive
than passive foot printing and can potentially harm the target system if not done carefully.
Ex: Nslookup,port scanning
Foot Printing
Methodologies
Result: https://www.keralapsc.gov.in/sites/default/files/2019-12/57-2019-OL.pdf
Result: https://www.keralapsc.gov.in/user/login
Whois Foot printing
WHOIS Foot printing refers to the process of gathering information about a domain name
or IP address by querying public WHOIS databases.it provides registration details about
domain names and IP addresses .
Website Footprinting
We use a software application or set of tools that allows users to create,
manage, and modify digital content on a website without needing to know
complex programming languages.
The Drupal 8.6.x has following vulnerabilities
1. Cross-site Scripting
2. Access bypass
it's often used for detailed reports about domain names, web server details, and
site owners.
Wayback machine
The Wayback Machine (operated by the Internet Archive) is an archive of web pages
and allows users to view the historical versions of websites.
SUBDOMAINS
SCANNING
The results shows that the web server suits several TLS ciphers
Here it uses DES and 3DES Ciphers which is not secure and suitable for for 64 bits.
To over come this we have to use AES(Advanced encryption standards ) which is more
secure
and supports higher value of size like 128,256 bits .
Weak Key Length: Using keys shorter than 128 bits in HTTPS connections can
weaken the encryption strength, making it more susceptible to attacks.
Recommended Actions:
Update Cipher Suites: Configure the server to use cipher suites with stronger key
lengths (e.g., 128-bit AES or higher).