Writing Homework Help
Estrella Mountain Community College Passive Corporate Recon PEN Testing Report
Reconnaissance is the first phase of compromise and considered the most important. An attacker will use publicly-available information known as Open Source Intelligence (OSINT), often referred to as digital footprint, to identify possible target services on a network for exploitation. A security professional using the same search looks for potential security leaks.
- Select one company from “List of Fortune 500 Companies and Their Websites,” provided in the required readings, and perform a passive information recon.
- Provide a brief overview of your selected company.
- Using Google or another public search engine, collect OSINT that can be used to identify corporate identifiable information and potential computing systems for exploitation (e.g., web, e-mail, FTP, DNS services), as well as employee names, email addresses, and PPI.
- Document your findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry-standard “Writing a Penetration Testing Report,” for examples of PEN Testing Reports.