- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 96字
- 2021-07-08 09:41:17
Introduction
We learned in the previous chapter the basics of hunting subdomains. In this chapter, we dive a little deeper and look at other different tools available for gathering Intel on our target. We start by using the infamous tools of Kali Linux.
Gathering information is a very crucial stage of performing a penetration test, as every next step we take after this will totally be an outcome of all the information we gather during this stage. So it is very important that we gather as much information as possible before jumping into the exploitation stage.
推薦閱讀
- Microsoft Exchange Server PowerShell Cookbook(Third Edition)
- Java高手真經(高級編程卷):Java Web高級開發技術
- Java從入門到精通(第4版)
- Architecting the Industrial Internet
- Processing互動編程藝術
- Web Application Development with MEAN
- Oracle Database 12c Security Cookbook
- 差分進化算法及其高維多目標優化應用
- C程序設計案例教程
- Unity Game Development Scripting
- 可解釋機器學習:模型、方法與實踐
- 搞定J2EE:Struts+Spring+Hibernate整合詳解與典型案例
- QlikView Unlocked
- 交互式程序設計(第2版)
- Android應用開發攻略