Which of the hacking methodology steps can be used to identify the applications and vendors used?

Which of the hacking methodology steps can be used to identify the applications and vendors used?
A . Enumeration
B . OSINT
C . Scanning
D . Surveillance

Answer: B

Explanation:

OSINT (Open Source Intelligence) refers to the collection and analysis of information gathered from public, freely available sources to be used in an intelligence context. In the context of hacking methodologies, OSINT can be used to identify applications and vendors employed by a target organization by analyzing publicly available data such as websites, code repositories, social media, and other internet-facing resources.

Reference: Michael Bazzell, "Open Source Intelligence Techniques".

Latest ICS-SCADA Dumps Valid Version with 75 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments