- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 215字
- 2021-07-09 20:20:40
Chapter 4. Intelligence Gathering
Actionable information is the key to success when performing a penetration test. The amount of public data that is available on the Internet is staggering, and sifting through it all to find useful information can be a daunting task. Luckily, there are tools available that assist in gathering and sorting through this wealth of knowledge. In this chapter, we will be reviewing some of these tools and focus on how to use the information to ensure your penetration tests are efficient, focused, and effective. Key topics covered include:
- What is reconnaissance and why do we need it?
- Reconnaissance types
- Using DNS to quickly identify potential targets
- Using search engines data
- Using metadata to your advantage
Tip
Throughout this chapter, we will use the domain names
example.com
,example.org
, andexample.net
, which are owned and maintained by IANA. Do not use these for practice purposes.These domain names are used as a representation of a domain that you own and/or have permission to use as a target for your testing. Ideally, you would set up a segmented and controlled virtual lab with DNS servers that allows you to test all of these commands at your leisure. For this, refer to the Packt book Building Virtual Pentesting Labs for Advanced Penetration Testing.
- 信息安全導(dǎo)論(在線實驗+在線自測)
- Metasploit Penetration Testing Cookbook(Third Edition)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 計算機使用安全與防護
- .NET安全攻防指南(上冊)
- Learning Veeam? Backup & Replication for VMware vSphere
- 同態(tài)密碼學(xué)原理及算法
- 模糊測試:強制發(fā)掘安全漏洞的利器
- 安全防御入門手冊
- 持續(xù)集成:軟件質(zhì)量改進和風(fēng)險降低之道
- 企業(yè)安全建設(shè)入門:基于開源軟件打造企業(yè)網(wǎng)絡(luò)安全
- 深入探索區(qū)塊鏈
- Hands-On Spring Security 5 for Reactive Applications
- Web應(yīng)用安全威脅與防治
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用實踐教程