官术网_书友最值得收藏!

Chapter 2. Advanced Reconnaissance Techniques

Actionable information is the key to success when performing a penetration test. The amount of public data that is available on the Internet is staggering, and sifting through it all to find useful information can be a daunting task. Luckily, there are tools available that assist in gathering and sorting through this wealth of knowledge. In this chapter, we will be reviewing some of these tools and will focus on how to use the information to ensure your penetration tests are efficient, focused, and effective. Key topics covered include:

  • What is reconnaissance and why do we need it
  • Reconnaissance types
  • Using DNS to quickly identify potential targets
  • Using search engines data
  • Using metadata to your advantage

    Note

    Throughout this chapter we will use the domain names example.com, example.org, and example.net which are owned and maintained by IANA. DO NOT USE THESE FOR PRACTICE PURPOSES.

    These domain names are used as a representation of a domain that you own and/or have permission to use as a target for your testing. Ideally, you would set up a segmented and controlled virtual lab with DNS servers that allows you to test all of these commands at your leisure.

主站蜘蛛池模板: 团风县| 盘锦市| 沙雅县| 遵义县| 土默特左旗| 紫阳县| 安达市| 九江县| 蒙阴县| 合肥市| 黑龙江省| 永顺县| 九寨沟县| 治多县| 南开区| 乐东| 五家渠市| 昂仁县| 泽库县| 渭源县| 安康市| 涪陵区| 黄梅县| 汾西县| 宁津县| 寻甸| 宝兴县| 襄城县| 科技| 乐业县| 辽阳市| 广汉市| 左权县| 屯昌县| 二连浩特市| 静乐县| 道孚县| 全椒县| 同德县| 稻城县| 新巴尔虎左旗|