Information Gathering and Network Mapping

CIS will gather information about the target system. Foot printing techniques will be deployed to gather any valuable information which is publicly available that would aid an attack. Once enough data has been gathered Firewall/IDS/IPS evasion and exploitation will be applied on the perimeter network identifying valuable targets present and network devices that might be of interest.