- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 78字
- 2021-07-08 09:41:17
Gathering Intel and Planning Attack Strategies
In this chapter, we will cover the following recipes:
- Getting a list of subdomains
- Using Shodan for fun and profit
- Shodan Honeyscore
- Shodan plugins
- Using Nmap to find open ports
- Bypassing firewalls with Nmap
- Searching for open directories
- Performing deep magic with DMitry
- Hunting for SSL flaws
- Exploring connections with intrace
- Digging deep with theharvester
- Finding technology behind web apps
- Scanning IPs with masscan
- Sniffing around with Kismet
- Testing routers with firewalk
推薦閱讀
- 深度實(shí)踐OpenStack:基于Python的OpenStack組件開(kāi)發(fā)
- Instant Testing with CasperJS
- Python數(shù)據(jù)分析入門(mén)與實(shí)戰(zhàn)
- Oracle從新手到高手
- 老“碼”識(shí)途
- Learning ELK Stack
- Elasticsearch for Hadoop
- 深入理解Android:Wi-Fi、NFC和GPS卷
- UML 基礎(chǔ)與 Rose 建模案例(第3版)
- 詳解MATLAB圖形繪制技術(shù)
- 軟件體系結(jié)構(gòu)
- Java并發(fā)編程:核心方法與框架
- Visual Basic程序設(shè)計(jì)全程指南
- Python+Office:輕松實(shí)現(xiàn)Python辦公自動(dòng)化
- Python預(yù)測(cè)分析與機(jī)器學(xué)習(xí)