06. Hacking Lifecycle - Exercise Part 1

Hacking Lifecycle - Exercise Part 1: Reconnaissance

This exercise has two parts. You will also perform a similar analysis in the final project.

ND545 C1 L3 05 Hacking Lifecycle Exercise1 Video

Part 1 - System Reconnaissance

The first step of the hacking lifecycle is to understand the networks, devices, systems, and applications under review. This is known as reconnaissance.

You can use whatever device or computer you're using for this course.

Answer the questions below about the device you're using for this course.

You'll use this information in the next lesson on Vulnerability Management

Device Reconnaissance

Task Description:

For the device you're using for this course, answer the questions below:

Task List:

Task Feedback:

You'll use this information in the next lesson on Vulnerability Management.

Device information workspace

QUESTION:

For each of the questions in the task list above, use this workspace to record your answers.

ANSWER:

You've taken the first step in the hacking lifecycle by capturing device, operating system and application information. Your answers may vary based on the device you use and the applications selected.