In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1. Information gathering
2. Determining network range
3. Identifying active machines
4. Finding open ports and applications
5. OS fingerprinting
6. Fingerprinting services
7. Mapping the network

Explore More

Recommended Firewall Freebies

A couple of very good free firewall programs you might consider installing include * ZoneAlarm from http://www.zonelabs.com * SyGate from http://www.sygate.com TIP If you really like the idea of a

Hackers

Many peoples ask me, what is hacker? I want to be hacker? What What and How How…. Read it. It’s Hacker Attitude. The Hacker Attitude Hackers solve problems and build

Critical SQL Injection in Stamps Myanmar

PlanetCreator has reported another critical SQL Injection (vulnerability) on Stamps Myanmar http://www.stampsmyanmar.com and powered by indexmyanmar SQL injection is a code injection technique that exploits a security vulnerability occurring in