- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 249字
- 2021-06-24 19:12:51
Intelligence gathering
The intelligence gathering stage is when the pentester searches for all available information about the organization from public sources. At the end of this phase, he will have a clear view of the network (domain name, IP ranges, TCP/UDP services, and authentication mechanisms), the systems (user/group names, system banners, and system architecture), and organizational information (employee details, press releases, and location). It depends on the type of pentesting (black, white, or gray). Implementing a good intelligence gathering methodology will facilitate the work in later steps.
The fuel of intelligence gathering is to get publicly available information from different sources. Intelligence gathering is not important in information security and penetration testing, but it is vital for national security, and as many concepts are inspired by the military strategies, in the cyber security field intelligence gathering is also inspired by the battlefields. But in a penetration testing context, all the techniques in this phase should be legal because good intentions do not mean breaking the law, that is why, we said publicly available information. If it is not, the case will be considered as industrial espionage. According to International Trade Commission estimates, current annual losses to US industries due to corporate espionage to be over $70 billion.
Intelligence gathering not only helps improve the security position of the organization, but it gives managers an eagle eye on the competition, and it results in better business decisions. Basically every intelligence gathering operation basically is done following a structured methodology.
- 電腦組裝與系統安裝
- 從零開始寫Linux內核:一書學透核心原理與實現
- 新手易學:系統安裝與重裝
- Implementing Azure DevOps Solutions
- 嵌入式實時操作系統:RT-Thread設計與實現
- 直播系統開發:基于Nginx與Nginx-rtmp-module
- Windows 7案例教程
- Android物聯網開發細致入門與最佳實踐
- 突破平面3ds Max動畫設計與制作
- OpenStack系統架構設計實戰
- NetDevOps入門與實踐
- Fedora 12 Linux應用基礎
- Linux軟件管理平臺設計與實現
- Hadoop Real-World Solutions Cookbook
- Linux內核API完全參考手冊(第2版)