Footprinting and Information Gathering
In this chapter, we will discuss the information gathering phase of penetration testing. We will describe the definition and purpose of information gathering. We will also describe several tools in Kali Linux that can be used for information gathering. After reading this chapter, we hope that the reader will have a better understanding of the information gathering phase and will be able to do information gathering during penetration testing.
Information gathering is the second phase in our penetration testing process (Kali Linux testing process) as explained in the Kali Linux testing methodology section in Chapter 3, Penetration Testing Methodology. In this phase, we try to collect as much information as we can about the target, for example, information about the Domain Name System (DNS) hostnames, IP addresses, technologies and configuration used, username's organization, documents, application code, password reset information, contact information, and so on. During information gathering, every piece of information gathered is considered important.
Information gathering can be categorized in two ways based on the method used: active information gathering and passive information gathering. In the active information gathering method, we collect information by introducing network traffic to the target network, while in the passive information gathering method, we gather information about a target network by utilizing a third party's services, such as the Google search engine. We will cover this later on.
For this chapter, we will utilize the passive and active methods of information gathering to get a better picture of the target.
We will be discussing the following topics in this chapter:
- Public websites that can be used to collect information about the target domain
- Domain registration information
- DNS analysis
- Route information
- Search engine utilization
- INSTANT Netcat Starter
- 大型互聯網企業安全架構
- 計算機病毒分析與防范大全(第3版)
- Getting Started with FortiGate
- 云原生安全與DevOps保障
- 先進云安全研究與實踐
- 持續集成:軟件質量改進和風險降低之道
- 構建新型網絡形態下的網絡空間安全體系
- Hands-On Artificial Intelligence for Cybersecurity
- 物聯網信息安全技術
- Securing Network Infrastructure
- CTF網絡安全競賽入門教程
- 黑客攻防從入門到精通:實戰篇(第2版)
- CCNA Security 210-260 Certification Guide
- AI+網絡安全:智網融合空間體系建設指南