- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 94字
- 2021-07-02 12:38:37
Intelligence-Gathering Tools
Let's move into actually using Kali NetHunter. We will start this journey by looking at the tools that are useful for gathering intelligence from a target host or network. The tools we will be encountering in this chapter will be those that tend to be deployed during the first phase of pentesting, with the potential to be deployed again during later phases.
In this chapter, we will cover the following topics:
- Objectives of intelligence gathering
- Tools for gathering useful information
- Downloading and copying a website
- Google hacking
- Social networking
- Using WHOIS
- nslookup
推薦閱讀
- DevSecOps敏捷安全
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- CSO進(jìn)階之路:從安全工程師到首席安全官
- INSTANT Metasploit Starter
- 黑客攻防技巧
- Penetration Testing with Perl
- 安全實(shí)戰(zhàn)之滲透測試
- 從0到1:CTFer成長之路
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 軟件安全保障體系架構(gòu)
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- Mastering Malware Analysis
- 社會(huì)工程:防范釣魚欺詐(卷3)
- 2010年中國互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報(bào)告