官术网_书友最值得收藏!

Introduction

We learned in the previous chapter the basics of hunting subdomains. In this chapter, we dive a little deeper and look at other different tools available for gathering Intel on our target. We start by using the infamous tools of Kali Linux.

Gathering information is a very crucial stage of performing a penetration test, as every next step we take after this will totally be an outcome of all the information we gather during this stage. So it is very important that we gather as much information as possible before jumping into the exploitation stage.

主站蜘蛛池模板: 井研县| 张家港市| 铁岭市| 贡觉县| 若尔盖县| 江山市| 普兰店市| 舟山市| 来凤县| 霍林郭勒市| 山西省| 朝阳区| 麻栗坡县| 射阳县| 沛县| 商城县| 略阳县| 铜山县| 昌乐县| 神木县| 太保市| 微博| 鞍山市| 济阳县| 兴义市| 泸定县| 城固县| 武胜县| 白玉县| 兴安县| 罗源县| 兖州市| 黄石市| 兴山县| 天长市| 内丘县| 乌苏市| 都江堰市| 普安县| 桓台县| 汽车|