Using public resources
On the internet, there are several public resources that can be used to collect information regarding a target domain. The benefit of using these resources is that your network traffic is not sent to the target domain directly, so your activities are not recorded in the target domain log files.
The following are the resources that can be used:

Due to the ease of use—you only need an internet connection and a web browser—we suggest that you utilize these public resources first before using the tools provided with Kali Linux.
To protect a domain from being abused, we have changed the domain name that we used in our examples. We are going to use several domain names, such as example.com from IANA and the free hacking testing site https://www.hackthissite.org/ as well, for illustrative purposes.
推薦閱讀
- Kali Linux Social Engineering
- API安全實戰(zhàn)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Wireshark 2 Quick Start Guide
- 數(shù)字安全藍皮書:本質屬性與重要特征
- Applied Network Security
- 計算機網絡安全基礎(第5版)
- 可信計算3.0工程初步(第二版)
- 物聯(lián)網安全滲透測試技術
- 學電腦安全與病毒防范
- 信息安全等級保護測評與整改指導手冊
- 解密數(shù)據(jù)恢復
- 網絡用戶行為的安全可信分析與控制
- Cybersecurity Threats,Malware Trends,and Strategies