官术网_书友最值得收藏!

Summary

In this chapter, we looked at information gathering and vulnerability scanning. We defined the difference between active and passive information gathering. We worked through the various tools that can be used for passive and active information gathering, and the tools that are needed for vulnerability scanning. Lastly, we worked through packet captures using graphical and command-line tools.

You now have the ability to perform information gathering using open source intelligence, which is passive information gathering. You have learned how to use Nmap for active information gathering, and how to leverage the Nmap scripting engine. You have gained the necessary skills to use vulnerability scanners such as OpenVAS and Nessus, and know how to perform a vulnerability scan to plan your attack. Packet capturing has taught you how to sniff traffic traversing a network, and how you can obtain valuable information from insecure protocols.

In the next chapter (Chapter 4, Mastering Social Engineering), we will look at what social engineering is and the different tools that you can use to perform social engineering. We will leverage built-in tools within Kali Linux, along with some additional tools that will need to be installed.

主站蜘蛛池模板: 胶州市| 天津市| 德化县| 临城县| 株洲县| 耿马| 武义县| 博爱县| 九龙县| 德庆县| 永修县| 临沂市| 孝义市| 汾西县| 晋中市| 甘德县| 利津县| 通渭县| 新乡市| 定州市| 大田县| 麻城市| 柏乡县| 嘉定区| 襄城县| 土默特右旗| 平谷区| 南召县| 陆良县| 大庆市| 南雄市| 民乐县| 木里| 扎兰屯市| 连江县| 巴马| 襄汾县| 略阳县| 囊谦县| 米易县| 定南县|