Sabtu, 08 September 2012

Information Gathering in www.spentera.com

In this post, I will discuss about the tracking information www.spentera.com site, the tracking, I use two methods: active and passive .. 

The First, the Active, I use a tool called nmap.
Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks,although it works fine against single hosts.

From the above display, visible PORT positions are open and locked , which port 80 and 8080 Open and port 443,8443 are closed.


From the above display, Increase verbosity level and number of the selected port and host.


On view below, it appears the name of the device and the operating system .



From the above display, ScanPBNJ performs an Nmap scan and then stores the results in a database. The ScanPBNJ stores information about the machine that has been scanned. ScanPBNJ stores the IP Address, Operating System,Hostname and a localhost bit.

The second is a passive way, as follows:



As I know Spentera is Security Consulting

The Information Security Consulting service was established to address the growing need for organizations to understand and manage security at a higher level and "talking techie" where appropriate.

Security Audit

Security audit helps clients evaluate their current security positions and implement suggested improvements before security gaps can become security breaches.

Penetration Testing

Spentera validates the control and implementation of existing security and risk measures by performing demonstrations of activities that are unknown in the networks, systems and attacks on application as part of a security testing in a safe and controlled manner.

Vulnerability Assessment

Spentera's Vulnerability Assessment Service can assist you in identifying the vulnerability of networks and information you have, by doing that, you can prevent attacks that may be made against such vulnerabilities.

Digital Forensics

Spentera digital forensics team perform the analysis based on various objectives, such as, discovery of perpetrator location, their identification and damaged instances which may involve different technologies like servers, laptops, portable media, mobile phones and backup devices.

Tidak ada komentar:

Posting Komentar