官术网_书友最值得收藏!

Introduction

We learned in the previous chapter the basics of hunting subdomains. In this chapter, we dive a little deeper and look at other different tools available for gathering Intel on our target. We start by using the infamous tools of Kali Linux.

Gathering information is a very crucial stage of performing a penetration test, as every next step we take after this will totally be an outcome of all the information we gather during this stage. So it is very important that we gather as much information as possible before jumping into the exploitation stage.

主站蜘蛛池模板: 桃园市| 大化| 穆棱市| 沁阳市| 伊通| 无为县| 双峰县| 仁布县| 锡林浩特市| 台州市| 武乡县| 长宁区| 乐业县| 曲水县| 锡林浩特市| 嘉善县| 弋阳县| 佛教| 丹东市| 巴马| 龙里县| 天峨县| 临澧县| 台前县| 大兴区| 思茅市| 嘉鱼县| 大石桥市| 延吉市| 托克托县| 布尔津县| 旅游| 乾安县| 夏河县| 当涂县| 乡城县| 珲春市| 蓬安县| 金坛市| 宜良县| 突泉县|