- Kali Linux Cookbook(Second Edition)
- Corey P. Schultz Bob Perciaccante
- 208字
- 2021-07-02 18:27:21
Gathering cloud service information
We next want to discover whether the target is using any cloud-based services. Based on the IP addresses we have found we can see if there are multiple different domain and host information associated with an individual IP Address which would indicate some form of cloud based service.
Cloud services come in several different forms and offerings. Cloud services originally started the as a service trend with Software as a Service (SaaS), such as Office 365 and Exchange 365 and a Platform as a Service (PaaS) like AWS and Azure. Today, many organizations rely on cloud-based systems. Sometimes, these systems are controlled, managed, and monitored as part of the data center infrastructure. At other times, this use is regarded as Shadow IT. Shadow IT refers to the services that are brought up outside the corporate IT environment and control. They are often used for development purposes or to actually get around restricts or delays based on standard corporate IT policies. These environments can be rich with information; in fact, some of the more recent breaches of Personally Identifiable Information (PII) have been from either unsecured or badly secured test applications, where they used real data in the databases.
- Python 3.7網絡爬蟲快速入門
- Java 開發從入門到精通(第2版)
- 體驗設計原理:行為、情感和細節
- C語言程序設計基礎與實驗指導
- Java程序設計與計算思維
- Java Web程序設計
- Getting Started with Greenplum for Big Data Analytics
- Mastering OAuth 2.0
- C# 7.1 and .NET Core 2.0:Modern Cross-Platform Development(Third Edition)
- 嵌入式C編程實戰
- Test-Driven iOS Development with Swift
- C++服務器開發精髓
- PHP動態網站開發實踐教程
- 計算思維與Python編程
- 零基礎入門學習C語言:帶你學C帶你飛