官术网_书友最值得收藏!

Footprinting and Information Gathering

In this chapter, we will discuss the information gathering phase of penetration testing. We will describe the definition and purpose of information gathering. We will also describe several tools in Kali Linux that can be used for information gathering. After reading this chapter, we hope that the reader will have a better understanding of the information gathering phase and will be able to do information gathering during penetration testing.

Information gathering is the second phase in our penetration testing process (Kali Linux testing process) as explained in the Kali Linux testing methodology section in Chapter 3, Penetration Testing Methodology. In this phase, we try to collect as much information as we can about the target, for example, information about the Domain Name System (DNS) hostnames, IP addresses, technologies and configuration used, username's organization, documents, application code, password reset information, contact information, and so on. During information gathering, every piece of information gathered is considered important.

Information gathering can be categorized in two ways based on the method used: active information gathering and passive information gathering. In the active information gathering method, we collect information by introducing network traffic to the target network, while in the passive information gathering method, we gather information about a target network by utilizing a third party's services, such as the Google search engine. We will cover this later on.

Remember that neither method is better in comparison to the other; each has its own advantage. In passive scanning, you gather less information, but your action will be stealthy, while in active scanning, you get more information, but some devices may catch your action. During a penetration testing project, this phase may be done several times for the completeness of information collected. You may also discuss with your pen-testing customer which method they want.

For this chapter, we will utilize the passive and active methods of information gathering to get a better picture of the target.

We will be discussing the following topics in this chapter:

  • Public websites that can be used to collect information about the target domain
  • Domain registration information
  • DNS analysis
  • Route information
  • Search engine utilization
主站蜘蛛池模板: 华池县| 缙云县| 绿春县| 道真| 杭锦后旗| 隆尧县| 万山特区| 全南县| 伊宁县| 盘锦市| 吐鲁番市| 郯城县| 泰兴市| 淮南市| 阿巴嘎旗| 萨嘎县| 来凤县| 班戈县| 耿马| 静安区| 社旗县| 和静县| 若羌县| 湘西| 静乐县| 赣榆县| 昌吉市| 图木舒克市| 二手房| 治多县| 新干县| 莎车县| 兴安县| 凤山县| 静海县| 台州市| 阿克苏市| 衢州市| 奉节县| 富阳市| 东阳市|