官术网_书友最值得收藏!

Information Gathering

With all the information that was received from the scoping meeting, it is now time to not only validate that information, but also learn as much as you can from your own information gathering research. The goal is to gain as much knowledge as possible about the network and systems before starting to scan for vulnerabilities and then exploiting them.

In this chapter, you will learn to use various tools to start and map out the network and systems and then enumerate your findings. The more information you can get from this phase, the easier it will be to find vulnerabilities and exploits. This step can save you a lot of time later in the lab. For example, if you learn that a web server is a Microsoft Windows 2012 server, you can utilize this information for a better understanding of how to approach the exploitation phase. Without this information, you may try a bunch of exploits against this server but they will not work because they are not meant for a Windows 2012 server.

With all that being said, there is always the temptation to speed through this phase after you find some systems you would like to probe deeper into. You must, at all costs, resist this action. You must spend a good portion of your allocated penetration-testing timeframe during this phase. The actual time spent here will depend on the overall engagement time. I cannot emphasize enough; this is probably the most important phase in the overall penetration test. The more the time you spend understanding the environment and targets, the less the time you will waste in other phases of the penetration test.

In this chapter, we will discuss the following topics:

  • Various tools in the toolbox
  • Whois, dnsmap,? and DNSRecon
  • Nmap
  • P0f
  • Firewall Dotdotpwn
主站蜘蛛池模板: 文化| 蓬莱市| 陕西省| 门头沟区| 阿荣旗| 榆社县| 哈密市| 贡觉县| 门源| 徐州市| 全椒县| 平泉县| 武宣县| 五常市| 筠连县| 佛学| 江西省| 平顶山市| 苗栗市| 嘉定区| 邹平县| 湾仔区| 姜堰市| 辉县市| 金溪县| 保靖县| 盐山县| 五河县| 武陟县| 乐陵市| 明水县| 吴江市| 阿巴嘎旗| 遂昌县| 赣榆县| 长武县| 邵东县| 滕州市| 法库县| 通州区| 赤水市|