官术网_书友最值得收藏!

Summary

In this chapter, we talked about the importance of information gathering and how it can make or break how successful the penetration test will be. Gathering as much information as possible prior to starting the exploitation phases save you time and effort as you will know what to attack and how to attack it, rather than wasting cycles trying to exploit things that will not work.

We went over a couple of tools in my toolbox for gathering some information. Each tool compliments each other and is powerful in what it can discover. These tools included whois, dnsmap, Nmap, p0f, Firewalk, DotDotPwn and Netdiscover. This is by no means an exhaustive list of tools but some of the more popular and effective ones that I use.

When going through these tools, I showed some examples on how I use them, but I also noted all the command-line arguments that are available. This way you can play around with them and discover which options and tools work best for your environment.

In the next chapter, we will discuss setting up and maintaining a command and control server. This is an important step for dropping files, data, and any other evidence you come across while performing your penetration test.

主站蜘蛛池模板: 革吉县| 获嘉县| 彩票| 景德镇市| 商河县| 闸北区| 康乐县| 偃师市| 克什克腾旗| 芜湖市| 屯门区| 邛崃市| 怀柔区| 安溪县| 四会市| 博爱县| 柯坪县| 顺昌县| 孟津县| 开远市| 祁连县| 新巴尔虎左旗| 昌宁县| 太谷县| 东平县| 南部县| 凤翔县| 龙里县| 什邡市| 南宁市| 沂水县| 沙田区| 南木林县| 会宁县| 泸州市| 临清市| 司法| 巴楚县| 宁乡县| 长兴县| 于田县|