官术网_书友最值得收藏!

Chapter 2. Advanced Reconnaissance Techniques

Actionable information is the key to success when performing a penetration test. The amount of public data that is available on the Internet is staggering, and sifting through it all to find useful information can be a daunting task. Luckily, there are tools available that assist in gathering and sorting through this wealth of knowledge. In this chapter, we will be reviewing some of these tools and will focus on how to use the information to ensure your penetration tests are efficient, focused, and effective. Key topics covered include:

  • What is reconnaissance and why do we need it
  • Reconnaissance types
  • Using DNS to quickly identify potential targets
  • Using search engines data
  • Using metadata to your advantage

    Note

    Throughout this chapter we will use the domain names example.com, example.org, and example.net which are owned and maintained by IANA. DO NOT USE THESE FOR PRACTICE PURPOSES.

    These domain names are used as a representation of a domain that you own and/or have permission to use as a target for your testing. Ideally, you would set up a segmented and controlled virtual lab with DNS servers that allows you to test all of these commands at your leisure.

主站蜘蛛池模板: 托里县| 安远县| 西乌珠穆沁旗| 茂名市| 新密市| 五华县| 随州市| 西乌珠穆沁旗| 香港| 沙田区| 山阴县| 阳泉市| 长岭县| 于田县| 理塘县| 济南市| 寿光市| 出国| 黑水县| 泗水县| 历史| 青岛市| 大港区| 南陵县| 周至县| 灯塔市| 朔州市| 海城市| 德阳市| 文化| 温州市| 常山县| 衡山县| 东乌珠穆沁旗| 福海县| 奎屯市| 汉沽区| 乌拉特中旗| 舟山市| 牡丹江市| 潜江市|