官术网_书友最值得收藏!

Gathering Intel and Planning Attack Strategies

In the previous chapter, we learned about the basics of hunting subdomains. In this chapter, we will dive a little deeper and look at other tools that are available for gathering Intel on our target. We will start by using the infamous tools of Kali Linux.

Gathering information is a crucial stage of performing a penetration test, as every step we take after this will be an outcome of all the information we gather during this stage. For this reason, it is very important that we gather as much information as possible before jumping into the exploitation stage.

In this chapter, we will cover the following recipes:

  • Getting a list of subdomains
  • Using Shodan for fun and profit
  • Shodan Honeyscore
  • Shodan plugins
  • Censys
  • Using Nmap to find open ports
  • Bypassing firewalls with Nmap
  • Searching for open directories using GoBuster
  • Hunting for SSL flaws
  • Automating brute force using Brutespray
  • Digging deep with TheHarvester
  • Finding technology behind webapps using WhatWeb
  • Scanning IPs with masscan
  • Finding origin servers with CloudBunny
  • Sniffing around with Kismet
  • Testing routers with Firewalk
主站蜘蛛池模板: 浮山县| 饶阳县| 斗六市| 宁强县| 天津市| 襄垣县| 白水县| 靖西县| 辉县市| 工布江达县| 孙吴县| 麻阳| 西华县| 平昌县| 博野县| 平度市| 彩票| 南陵县| 金阳县| 凉城县| 武山县| 吴忠市| 阿拉善右旗| 吉安县| 陵水| 闻喜县| 斗六市| 金川县| 安丘市| 镇巴县| 宣威市| 依兰县| 治县。| 云林县| 新疆| 安陆市| 内黄县| 八宿县| 苍溪县| 陆丰市| 文山县|