官术网_书友最值得收藏!

Reconnaissance objectives

  • Target background: What is the focus of the target's business?
  • Target's associates: Who are the business partners, vendors, and customers?
  • Target's investment in security: Are security policies advertised? What is the potential investment security, and user security awareness?
  • Target's business and security policies: How does the business operate? Where are the potential weaknesses in operation?
  • Target's people: What type of people work there? How can they become your asset for the attack?
  • Define targets: What are the lowest hanging fruit targets? What should be avoided?
  • Target's network: How do the people and devices communicate on the network?
  • Target's defenses: What type of security is in place? Where is it located?
  • Target's technologies: What technologies are used for e-mail, network traffic, storing information, authentication, and so on? Are they vulnerable?

Kali Linux contains an extensive catalog of tools titled Information Gathering specified for Reconnaissance efforts. It could fill a separate book to cover all tools and methods offered for Information Gathering. This chapter will focus on various web application Reconnaissance topics and relate the best tools found on the Internet as well as that offered by Kali Linux.

主站蜘蛛池模板: 攀枝花市| 宣汉县| 民勤县| 甘孜| 驻马店市| 特克斯县| 涞水县| 昌黎县| 日喀则市| 洞头县| 新平| 陆良县| 新干县| 大姚县| 高陵县| 佛坪县| 延寿县| 克山县| 齐河县| 如皋市| 吴江市| 大渡口区| 开封县| 清苑县| 江山市| 西峡县| 洛隆县| 化德县| 泗洪县| 沅江市| 奉新县| 滨州市| 兴化市| 翁牛特旗| 广东省| 乌什县| 红河县| 灵山县| 罗定市| 天等县| 溧阳市|