- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 92字
- 2021-08-13 15:36:45
Reconnaissance
This is the most crucial phase of a CKC. The adversary will try to gather as much information as possible on the target. For example, an adversary can look for an organization's website for vulnerabilities or an employee's profile/email/credentials for a spear phishing or watering-hole attack. It can also dumpster dive to look for certain credentials and access keys in the target organization's network, Open Source Intelligence (OSINT), and so on.
You can find a really well-maintained list of tools and public online portals for gathering intel at this link: https://github.com/jivoi/awesome-osint
推薦閱讀
- Learn pfSense 2.4
- Axure RP 7.0從入門到精通:Web + APP產(chǎn)品經(jīng)理原型設(shè)計
- 計算機網(wǎng)絡(luò)技術(shù)基礎(chǔ)(第2版)
- 網(wǎng)絡(luò)規(guī)劃與設(shè)計實用教程
- 信息系統(tǒng)項目管理
- 計算機網(wǎng)絡(luò)基礎(chǔ):基于案例與實訓 第2版
- ns-3網(wǎng)絡(luò)模擬器基礎(chǔ)及應(yīng)用
- 深入淺出Vue.js
- JavaScript+jQuery前端開發(fā)基礎(chǔ)教程(微課版)
- 全球網(wǎng)絡(luò)身份管理的現(xiàn)狀與發(fā)展
- 全棧性能測試修煉寶典:JMeter實戰(zhàn)(第2版)
- 網(wǎng)站組建、管理與維護
- NS2仿真實驗
- Hands-On Networking with Azure
- Div+CSS3.0網(wǎng)頁布局實戰(zhàn)從入門到精通(第2版)