官术网_书友最值得收藏!

Gathering Intel and Planning Attack Strategies

In the previous chapter, we learned about the basics of hunting subdomains. In this chapter, we will dive a little deeper and look at other tools that are available for gathering Intel on our target. We will start by using the infamous tools of Kali Linux.

Gathering information is a crucial stage of performing a penetration test, as every step we take after this will be an outcome of all the information we gather during this stage. For this reason, it is very important that we gather as much information as possible before jumping into the exploitation stage.

In this chapter, we will cover the following recipes:

  • Getting a list of subdomains
  • Using Shodan for fun and profit
  • Shodan Honeyscore
  • Shodan plugins
  • Censys
  • Using Nmap to find open ports
  • Bypassing firewalls with Nmap
  • Searching for open directories using GoBuster
  • Hunting for SSL flaws
  • Automating brute force using Brutespray
  • Digging deep with TheHarvester
  • Finding technology behind webapps using WhatWeb
  • Scanning IPs with masscan
  • Finding origin servers with CloudBunny
  • Sniffing around with Kismet
  • Testing routers with Firewalk
主站蜘蛛池模板: 岗巴县| 疏附县| 维西| 越西县| 旌德县| 永春县| 綦江县| 莫力| 灵丘县| 武功县| 海兴县| 迁西县| 靖宇县| 日照市| 正定县| 绍兴县| 济阳县| 兴山县| 阳西县| 新乐市| 永清县| 乌鲁木齐县| 南康市| 潼南县| 永州市| 宜阳县| 涡阳县| 辽宁省| 太谷县| 鲁甸县| 上犹县| 玛沁县| 晴隆县| 七台河市| 衡阳县| 呼图壁县| 蒲江县| 抚顺县| 韶山市| 新竹市| 凤台县|