官术网_书友最值得收藏!

Reconnaissance

This is the most crucial phase of a CKC. The adversary will try to gather as much information as possible on the target. For example, an adversary can look for an organization's website for vulnerabilities or an employee's profile/email/credentials for a spear phishing or watering-hole attack. It can also dumpster dive to look for certain credentials and access keys in the target organization's network, Open Source Intelligence (OSINT), and so on.

You can find a really well-maintained list of tools and public online portals for gathering intel at this link: https://github.com/jivoi/awesome-osint
主站蜘蛛池模板: 松潘县| 阿巴嘎旗| 东乡族自治县| 台北市| 社旗县| 乳源| 桦南县| 凌海市| 安塞县| 和龙市| 孝昌县| 绥阳县| 溆浦县| 舒城县| 河北省| 佛坪县| 永宁县| 崇明县| 崇文区| 同德县| 井冈山市| 朝阳县| 玉山县| 正安县| 循化| 清流县| 千阳县| 博白县| 石渠县| 丹棱县| 五华县| 惠来县| 会理县| 琼结县| 长葛市| 阿拉善右旗| 巴林右旗| 南靖县| 克什克腾旗| 石屏县| 济南市|