- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 96字
- 2021-07-08 09:41:17
Introduction
We learned in the previous chapter the basics of hunting subdomains. In this chapter, we dive a little deeper and look at other different tools available for gathering Intel on our target. We start by using the infamous tools of Kali Linux.
Gathering information is a very crucial stage of performing a penetration test, as every next step we take after this will totally be an outcome of all the information we gather during this stage. So it is very important that we gather as much information as possible before jumping into the exploitation stage.
推薦閱讀
- 數據庫系統原理及MySQL應用教程(第2版)
- PHP程序設計(慕課版)
- Python自動化運維快速入門(第2版)
- Reactive Programming with Swift
- 算法訓練營:入門篇(全彩版)
- 趣學Python算法100例
- Instant Typeahead.js
- UI智能化與前端智能化:工程技術、實現方法與編程思想
- 用Flutter極速構建原生應用
- RISC-V體系結構編程與實踐(第2版)
- Learning Probabilistic Graphical Models in R
- The Professional ScrumMaster’s Handbook
- Python 3.7從入門到精通(視頻教學版)
- Python機器學習之金融風險管理
- PrimeFaces Blueprints