官术网_书友最值得收藏!

Summary

In this chapter, we looked at information gathering and vulnerability scanning. We defined the difference between active and passive information gathering. We worked through the various tools that can be used for passive and active information gathering, and the tools that are needed for vulnerability scanning. Lastly, we worked through packet captures using graphical and command-line tools.

You now have the ability to perform information gathering using open source intelligence, which is passive information gathering. You have learned how to use Nmap for active information gathering, and how to leverage the Nmap scripting engine. You have gained the necessary skills to use vulnerability scanners such as OpenVAS and Nessus, and know how to perform a vulnerability scan to plan your attack. Packet capturing has taught you how to sniff traffic traversing a network, and how you can obtain valuable information from insecure protocols.

In the next chapter (Chapter 4, Mastering Social Engineering), we will look at what social engineering is and the different tools that you can use to perform social engineering. We will leverage built-in tools within Kali Linux, along with some additional tools that will need to be installed.

主站蜘蛛池模板: 景德镇市| 富民县| 泌阳县| 香港| 芜湖县| 林甸县| 崇仁县| 姜堰市| 武夷山市| 柘城县| 秭归县| 上饶市| 峡江县| 乐陵市| 平阴县| 七台河市| 博客| 平利县| 新龙县| 手游| 宽城| 桂林市| 三门县| 巴楚县| 罗平县| 临漳县| 封开县| 汾西县| 广东省| 平罗县| 滕州市| 彭州市| 鹤庆县| 涿州市| 达日县| 密山市| 漯河市| 赤水市| 祥云县| 景泰县| 巨鹿县|