Page 13 - CPTE_Prep_Guide_Sample
P. 13
• Inoculation – Preventing social
engineering and other fraudulent tricks
or traps by instilling a resistance to
persuasion attempts through exposure
to similar attempts.
• Review – Reviewing the above steps
regularly: no solutions to information
integrity are perfect
• Waste Management – Using a waste
management service that has
dumpsters with locks on them, with
keys limited only to the waste
management company and the cleaning
staff
Section 5 – Banner Grabbing
48 49
Banner grabbing technique gives information
about the systems on the network, services
running on ports, versions of operating
systems, and version of applications.
Technique useful to catalog systems and
service on the network. Hackers identify the
operating system and versions of applications
used on the target host to figure out
vulnerabilities the system possesses and
48 Certified Professional Ethical Hacker Workbook v5 Volume 2,
Mile2, 50-59.
49 Certified Penetration Testing Engineer Workbook v5 Volume 1,
Mile2, 213-228.
418