- Kali Linux Cookbook(Second Edition)
- Corey P. Schultz Bob Perciaccante
- 103字
- 2021-07-02 18:27:17
Introduction
In this chapter, you will learn the skills necessary to gather information about your target environment. We will spend time trying to identify as much information as possible. The more information we can gather will provide us with more potential vectors for possible penetration in the environment as well as make those penetration attempts more successful. We will gather domain names, IP subnets, hosts, routing information, as well as other useful information. You will also learn how to keep track of this data, so we can refer to it in the future as we progress through our penetration testing environment.
推薦閱讀
- Learn Blockchain Programming with JavaScript
- Mastering Python Scripting for System Administrators
- Apache Hive Essentials
- x86匯編語言:從實(shí)模式到保護(hù)模式(第2版)
- Mastering AndEngine Game Development
- Mastering JavaScript High Performance
- 微信小程序全棧開發(fā)技術(shù)與實(shí)戰(zhàn)(微課版)
- C++程序設(shè)計(jì)
- 石墨烯改性塑料
- 現(xiàn)代CPU性能分析與優(yōu)化
- UML基礎(chǔ)與Rose建模實(shí)用教程(第三版)
- 3ds Max 2018從入門到精通
- 高性能PHP 7
- Magento 2 Developer's Guide
- 計(jì)算機(jī)軟件項(xiàng)目實(shí)訓(xùn)指導(dǎo)