官术网_书友最值得收藏!

Gathering Intel and Planning Attack Strategies

In the previous chapter, we learned about the basics of hunting subdomains. In this chapter, we will dive a little deeper and look at other tools that are available for gathering Intel on our target. We will start by using the infamous tools of Kali Linux.

Gathering information is a crucial stage of performing a penetration test, as every step we take after this will be an outcome of all the information we gather during this stage. For this reason, it is very important that we gather as much information as possible before jumping into the exploitation stage.

In this chapter, we will cover the following recipes:

  • Getting a list of subdomains
  • Using Shodan for fun and profit
  • Shodan Honeyscore
  • Shodan plugins
  • Censys
  • Using Nmap to find open ports
  • Bypassing firewalls with Nmap
  • Searching for open directories using GoBuster
  • Hunting for SSL flaws
  • Automating brute force using Brutespray
  • Digging deep with TheHarvester
  • Finding technology behind webapps using WhatWeb
  • Scanning IPs with masscan
  • Finding origin servers with CloudBunny
  • Sniffing around with Kismet
  • Testing routers with Firewalk
主站蜘蛛池模板: 从江县| 三台县| 宿州市| 连州市| 邳州市| 高雄市| 聂拉木县| 内黄县| 丰顺县| 长岭县| 东城区| 仪陇县| 永泰县| 康乐县| 东至县| 社会| 揭西县| 嵩明县| 渝中区| 安陆市| 通道| 安徽省| 兰考县| 曲阳县| 石城县| 徐闻县| 莫力| 平阳县| 芜湖市| 穆棱市| 邵武市| 安义县| 阿拉善左旗| 平乐县| 遵义市| 西昌市| 杭锦后旗| 鹤山市| 遂昌县| 改则县| 剑阁县|