Page 13 - CPTE_Prep_Guide_Sample
P. 13

•  Inoculation – Preventing social
                          engineering and other fraudulent tricks
                          or traps by instilling a resistance to
                          persuasion attempts through exposure
                          to similar attempts.
                       •  Review – Reviewing the above steps
                          regularly: no solutions to information
                          integrity are perfect
                       •  Waste Management – Using a waste
                          management service that has
                          dumpsters with locks on them, with
                          keys limited only to the waste
                          management company and the cleaning
                          staff

                   Section 5 – Banner Grabbing
                                                      48 49

                   Banner grabbing technique gives information
                   about the systems on the network, services
                   running on ports, versions of operating
                   systems, and version of applications.
                   Technique useful to catalog systems and
                   service on the network. Hackers identify the
                   operating system and versions of applications
                   used on the target host to figure out
                   vulnerabilities the system possesses and




                   48  Certified Professional Ethical Hacker Workbook v5 Volume 2,
                   Mile2, 50-59.
                   49  Certified Penetration Testing Engineer Workbook v5 Volume 1,
                   Mile2, 213-228.


                                                               418
   8   9   10   11   12   13   14   15   16   17   18