- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 124字
- 2021-07-02 21:04:12
OSINT
Generally, the first step in a penetration test or an attack is the collection of open source intelligence, or OSINT. It is the art of collecting information from public sources, particularly the internet. The amount of available information is considerable – most intelligence and military organizations are actively engaged in OSINT activities to collect information about their targets, and to guard against data leakage.
OSINT can be divided into two types: offensive and defensive. Offensive OSINT deals with all the data that is required to prepare an attack on the target, while defensive OSINT is the art of collecting the data of a previous breach and other security incidents relevant to the target.
The following diagram depicts a basic mind map for OSINT:

- Deploying Node.js
- Effective C#:改善C#代碼的50個有效方法(原書第3版)
- 編寫高質(zhì)量代碼:改善Python程序的91個建議
- C語言程序設(shè)計(jì)教程(第2版)
- Scratch 3游戲與人工智能編程完全自學(xué)教程
- 深入RabbitMQ
- Nginx Lua開發(fā)實(shí)戰(zhàn)
- Visual C++開發(fā)入行真功夫
- Machine Learning in Java
- Machine Learning With Go
- Laravel Application Development Blueprints
- Visual FoxPro 6.0程序設(shè)計(jì)
- 小程序從0到1:微信全棧工程師一本通
- 零基礎(chǔ)看圖學(xué)ScratchJr:少兒趣味編程(全彩大字版)
- Sitecore Cookbook for Developers