- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 182字
- 2021-06-24 15:59:19
Gathering Intel and Planning Attack Strategies
In the previous chapter, we learned about the basics of hunting subdomains. In this chapter, we will dive a little deeper and look at other tools that are available for gathering Intel on our target. We will start by using the infamous tools of Kali Linux.
Gathering information is a crucial stage of performing a penetration test, as every step we take after this will be an outcome of all the information we gather during this stage. For this reason, it is very important that we gather as much information as possible before jumping into the exploitation stage.
In this chapter, we will cover the following recipes:
- Getting a list of subdomains
- Using Shodan for fun and profit
- Shodan Honeyscore
- Shodan plugins
- Censys
- Using Nmap to find open ports
- Bypassing firewalls with Nmap
- Searching for open directories using GoBuster
- Hunting for SSL flaws
- Automating brute force using Brutespray
- Digging deep with TheHarvester
- Finding technology behind webapps using WhatWeb
- Scanning IPs with masscan
- Finding origin servers with CloudBunny
- Sniffing around with Kismet
- Testing routers with Firewalk
推薦閱讀
- Learning OpenDaylight
- Cybersecurity:Attack and Defense Strategies
- Mobile-first Bootstrap
- 網絡操作系統:Windows Server 2003管理與應用
- 玩到極致 iPhone 4S完全攻略
- Linux網絡內核分析與開發
- 嵌入式實時操作系統:RT-Thread設計與實現
- Learning Magento 2 Administration
- Cassandra 3.x High Availability(Second Edition)
- Windows 7實戰從入門到精通
- Linux網絡操作系統項目教程(RHEL 7.4/CentOS 7.4)(第3版)(微課版)
- bash shell腳本編程經典實例(第2版)
- Linux集群之美
- 應急指揮信息系統設計
- Responsive Web Design with AngularJS