Lab #4 - Assessment Worksheet

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

262

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

7

Uploaded by cheyennemaxey97

Report
1) The five steps to ethical hacking are: a. Reconnaissance b. Scanning c. Gaining access d. Maintaining access e. Clearing track 2) Open Ports Service 3) Reconnaissance/Scanning step 4) The reconnaissance phase. 5) vstfpd 6) Written permissions to continue. 21 ftp 22 ssh 23 telnet 25 smtp 53 domain 80 http 111 rpcbind 139 netbios-ssn 445 netbios-ssn 512 exec 513 login 514 shell 1099 java-rmi 1524 shell 2049 nfs 2121 ftp 3306 mysql 5432 postgresql 5900 vrc 6000 xll 6667 irc 8009 ajp13 8180 http
Hands on – Section 1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help