- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 96字
- 2021-07-08 09:41:17
Introduction
We learned in the previous chapter the basics of hunting subdomains. In this chapter, we dive a little deeper and look at other different tools available for gathering Intel on our target. We start by using the infamous tools of Kali Linux.
Gathering information is a very crucial stage of performing a penetration test, as every next step we take after this will totally be an outcome of all the information we gather during this stage. So it is very important that we gather as much information as possible before jumping into the exploitation stage.
推薦閱讀
- Puppet 4 Essentials(Second Edition)
- JavaScript前端開發模塊化教程
- Oracle 11g從入門到精通(第2版) (軟件開發視頻大講堂)
- 單片機C語言程序設計實訓100例:基于STC8051+Proteus仿真與實戰
- Java 9 Programming Blueprints
- DevOps Automation Cookbook
- C++ 從入門到項目實踐(超值版)
- C語言課程設計
- Python Data Analysis Cookbook
- iOS開發實戰:從入門到上架App Store(第2版) (移動開發叢書)
- Mastering Xamarin.Forms(Second Edition)
- 編寫高質量代碼:改善Objective-C程序的61個建議
- Python第三方庫開發應用實戰
- Mastering ArcGIS Server Development with JavaScript
- Spring Web Services 2 Cookbook