- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 182字
- 2021-06-24 15:59:19
Gathering Intel and Planning Attack Strategies
In the previous chapter, we learned about the basics of hunting subdomains. In this chapter, we will dive a little deeper and look at other tools that are available for gathering Intel on our target. We will start by using the infamous tools of Kali Linux.
Gathering information is a crucial stage of performing a penetration test, as every step we take after this will be an outcome of all the information we gather during this stage. For this reason, it is very important that we gather as much information as possible before jumping into the exploitation stage.
In this chapter, we will cover the following recipes:
- Getting a list of subdomains
- Using Shodan for fun and profit
- Shodan Honeyscore
- Shodan plugins
- Censys
- Using Nmap to find open ports
- Bypassing firewalls with Nmap
- Searching for open directories using GoBuster
- Hunting for SSL flaws
- Automating brute force using Brutespray
- Digging deep with TheHarvester
- Finding technology behind webapps using WhatWeb
- Scanning IPs with masscan
- Finding origin servers with CloudBunny
- Sniffing around with Kismet
- Testing routers with Firewalk
推薦閱讀
- Linux系統文件安全實戰全攻略
- 無蘋果不生活 OS X Mountain Lion隨身寶典
- SOA實踐者說
- 新手易學:系統安裝與重裝
- Linux操作系統應用編程
- Linux自動化運維:Shell與Ansible(微課版)
- Linux系統安全基礎:二進制代碼安全性分析基礎與實踐
- Ceph分布式存儲實戰
- Application Development in iOS 7
- Mastering Reactive JavaScript
- 計算機系統:基于x86+Linux平臺
- Distributed Computing with Go
- Linux內核API完全參考手冊(第2版)
- Docker容器技術與運維
- Building E-commerce Sites with Drupal Commerce Cookbook