- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 249字
- 2021-06-24 19:12:51
Intelligence gathering
The intelligence gathering stage is when the pentester searches for all available information about the organization from public sources. At the end of this phase, he will have a clear view of the network (domain name, IP ranges, TCP/UDP services, and authentication mechanisms), the systems (user/group names, system banners, and system architecture), and organizational information (employee details, press releases, and location). It depends on the type of pentesting (black, white, or gray). Implementing a good intelligence gathering methodology will facilitate the work in later steps.
The fuel of intelligence gathering is to get publicly available information from different sources. Intelligence gathering is not important in information security and penetration testing, but it is vital for national security, and as many concepts are inspired by the military strategies, in the cyber security field intelligence gathering is also inspired by the battlefields. But in a penetration testing context, all the techniques in this phase should be legal because good intentions do not mean breaking the law, that is why, we said publicly available information. If it is not, the case will be considered as industrial espionage. According to International Trade Commission estimates, current annual losses to US industries due to corporate espionage to be over $70 billion.
Intelligence gathering not only helps improve the security position of the organization, but it gives managers an eagle eye on the competition, and it results in better business decisions. Basically every intelligence gathering operation basically is done following a structured methodology.
- 構(gòu)建高可用Linux服務(wù)器(第4版)
- Learning Android Intents
- Arch Linux Environment Setup How-to
- 構(gòu)建可擴(kuò)展分布式系統(tǒng):方法與實(shí)踐
- Ubuntu Linux操作系統(tǒng)
- Windows Phone 7.5 Data Cookbook
- Linux網(wǎng)絡(luò)內(nèi)核分析與開發(fā)
- Linux就該這么學(xué)
- 8051軟核處理器設(shè)計(jì)實(shí)戰(zhàn)
- Ceph分布式存儲(chǔ)實(shí)戰(zhàn)
- Fedora 12 Linux應(yīng)用基礎(chǔ)
- Hands-On GPU Programming with Python and CUDA
- 鴻蒙操作系統(tǒng)設(shè)計(jì)原理與架構(gòu)
- Learning BeagleBone
- 應(yīng)急指揮信息系統(tǒng)設(shè)計(jì)