官术网_书友最值得收藏!

Introduction

We learned in the previous chapter the basics of hunting subdomains. In this chapter, we dive a little deeper and look at other different tools available for gathering Intel on our target. We start by using the infamous tools of Kali Linux.

Gathering information is a very crucial stage of performing a penetration test, as every next step we take after this will totally be an outcome of all the information we gather during this stage. So it is very important that we gather as much information as possible before jumping into the exploitation stage.

主站蜘蛛池模板: 南漳县| 黔西| 林芝县| 福泉市| 东莞市| 高阳县| 广安市| 分宜县| 彰化县| 南华县| 涞源县| 文登市| 阿克陶县| 那坡县| 五峰| 蒙山县| 伽师县| 五家渠市| 依安县| 文登市| 上高县| 弥渡县| 独山县| 清水县| 区。| 旺苍县| 裕民县| 阿克苏市| 三河市| 黔东| 曲松县| 威远县| 石渠县| 上思县| 金寨县| 峨山| 鄄城县| 鄂托克旗| 青铜峡市| 保靖县| 精河县|