- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 78字
- 2021-07-08 09:41:17
Gathering Intel and Planning Attack Strategies
In this chapter, we will cover the following recipes:
- Getting a list of subdomains
- Using Shodan for fun and profit
- Shodan Honeyscore
- Shodan plugins
- Using Nmap to find open ports
- Bypassing firewalls with Nmap
- Searching for open directories
- Performing deep magic with DMitry
- Hunting for SSL flaws
- Exploring connections with intrace
- Digging deep with theharvester
- Finding technology behind web apps
- Scanning IPs with masscan
- Sniffing around with Kismet
- Testing routers with firewalk
推薦閱讀
- UNIX編程藝術(shù)
- CMDB分步構(gòu)建指南
- PHP基礎(chǔ)案例教程
- Groovy for Domain:specific Languages(Second Edition)
- Learn Scala Programming
- 零基礎(chǔ)入門學(xué)習(xí)Python
- Node.js全程實(shí)例
- C語言程序設(shè)計(jì)
- Lighttpd源碼分析
- C陷阱與缺陷
- CodeIgniter Web Application Blueprints
- Learning Jakarta Struts 1.2: a concise and practical tutorial
- iOS開發(fā)項(xiàng)目化入門教程
- Learning iOS Penetration Testing
- 嵌入式Linux與物聯(lián)網(wǎng)軟件開發(fā):C語言內(nèi)核深度解析