官术网_书友最值得收藏!

Summary

In this chapter, we talked about the importance of information gathering and how it can make or break how successful the penetration test will be. Gathering as much information as possible prior to starting the exploitation phases save you time and effort as you will know what to attack and how to attack it, rather than wasting cycles trying to exploit things that will not work.

We went over a couple of tools in my toolbox for gathering some information. Each tool compliments each other and is powerful in what it can discover. These tools included whois, dnsmap, Nmap, p0f, Firewalk, DotDotPwn and Netdiscover. This is by no means an exhaustive list of tools but some of the more popular and effective ones that I use.

When going through these tools, I showed some examples on how I use them, but I also noted all the command-line arguments that are available. This way you can play around with them and discover which options and tools work best for your environment.

In the next chapter, we will discuss setting up and maintaining a command and control server. This is an important step for dropping files, data, and any other evidence you come across while performing your penetration test.

主站蜘蛛池模板: 井陉县| 乐亭县| 思南县| 合作市| 上思县| 泰宁县| 永定县| 边坝县| 惠安县| 台山市| 穆棱市| 武胜县| 新绛县| 潢川县| 叶城县| 晋城| 锦州市| 札达县| 泸溪县| 柳江县| 盐源县| 金平| 洛南县| 会同县| 罗山县| 延边| 泾源县| 射阳县| 徐汇区| 临安市| 囊谦县| 潍坊市| 临潭县| 板桥市| 富宁县| 青浦区| 华阴市| 罗山县| 兰州市| 辉县市| 宁陕县|