- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 141字
- 2021-06-24 18:19:09
Using public resources
On the internet, there are several public resources that can be used to collect information regarding a target domain. The benefit of using these resources is that your network traffic is not sent to the target domain directly, so your activities are not recorded in the target domain log files.
The following are the resources that can be used:

Due to the ease of use—you only need an internet connection and a web browser—we suggest that you utilize these public resources first before using the tools provided with Kali Linux.
To protect a domain from being abused, we have changed the domain name that we used in our examples. We are going to use several domain names, such as example.com from IANA and the free hacking testing site https://www.hackthissite.org/ as well, for illustrative purposes.
推薦閱讀
- unidbg逆向工程:原理與實踐
- 工業互聯網安全
- Kali Linux Social Engineering
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Wireshark 2 Quick Start Guide
- 同態密碼學原理及算法
- Learning Veeam? Backup & Replication for VMware vSphere
- 防火墻技術與應用(第2版)
- Applied Network Security
- 安全防御入門手冊
- 數據保護:工作負載的可恢復性
- 網絡安全大數據分析與實戰
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 捍衛隱私
- Mastering Python for Networking and Security