Using public resources
On the internet, there are several public resources that can be used to collect information regarding a target domain. The benefit of using these resources is that your network traffic is not sent to the target domain directly, so your activities are not recorded in the target domain log files.
The following are the resources that can be used:

Due to the ease of use—you only need an internet connection and a web browser—we suggest that you utilize these public resources first before using the tools provided with Kali Linux.
To protect a domain from being abused, we have changed the domain name that we used in our examples. We are going to use several domain names, such as example.com from IANA and the free hacking testing site https://www.hackthissite.org/ as well, for illustrative purposes.
推薦閱讀
- Mobile Forensics Cookbook
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 特種木馬防御與檢測技術(shù)研究
- 網(wǎng)絡(luò)安全保障能力研究
- 計算機(jī)使用安全與防護(hù)
- Penetration Testing with Perl
- 黑客攻防與無線安全從新手到高手(超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- 軟件安全保障體系架構(gòu)
- Mastering Reverse Engineering
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- 物聯(lián)網(wǎng)信息安全技術(shù)