官术网_书友最值得收藏!

Summary

In this chapter, we talked about the importance of information gathering and how it can make or break how successful the penetration test will be. Gathering as much information as possible prior to starting the exploitation phases save you time and effort as you will know what to attack and how to attack it, rather than wasting cycles trying to exploit things that will not work.

We went over a couple of tools in my toolbox for gathering some information. Each tool compliments each other and is powerful in what it can discover. These tools included whois, dnsmap, Nmap, p0f, Firewalk, DotDotPwn and Netdiscover. This is by no means an exhaustive list of tools but some of the more popular and effective ones that I use.

When going through these tools, I showed some examples on how I use them, but I also noted all the command-line arguments that are available. This way you can play around with them and discover which options and tools work best for your environment.

In the next chapter, we will discuss setting up and maintaining a command and control server. This is an important step for dropping files, data, and any other evidence you come across while performing your penetration test.

主站蜘蛛池模板: 桑日县| 甘孜县| 东莞市| 炎陵县| 鄂托克前旗| 百色市| 澄迈县| 惠东县| 鲁山县| 南汇区| 竹北市| 邵阳市| 南陵县| 永春县| 柳河县| 凤冈县| 灵璧县| 佛坪县| 西吉县| 洞头县| 日土县| 鄂州市| 南投县| 东丽区| 嘉定区| 旺苍县| 开原市| 太和县| 襄樊市| 罗江县| 武威市| 莫力| 辽中县| 平安县| 中西区| 巩义市| 牟定县| 马公市| 任丘市| 佳木斯市| 酒泉市|