- Penetration Testing Bootcamp
- Jason Beltrame
- 208字
- 2021-07-02 21:36:00
Summary
In this chapter, we talked about the importance of information gathering and how it can make or break how successful the penetration test will be. Gathering as much information as possible prior to starting the exploitation phases save you time and effort as you will know what to attack and how to attack it, rather than wasting cycles trying to exploit things that will not work.
We went over a couple of tools in my toolbox for gathering some information. Each tool compliments each other and is powerful in what it can discover. These tools included whois, dnsmap, Nmap, p0f, Firewalk, DotDotPwn and Netdiscover. This is by no means an exhaustive list of tools but some of the more popular and effective ones that I use.
When going through these tools, I showed some examples on how I use them, but I also noted all the command-line arguments that are available. This way you can play around with them and discover which options and tools work best for your environment.
In the next chapter, we will discuss setting up and maintaining a command and control server. This is an important step for dropping files, data, and any other evidence you come across while performing your penetration test.
- Learning Python Web Penetration Testing
- HornetQ Messaging Developer’s Guide
- Advanced Quantitative Finance with C++
- PHP 編程從入門到實踐
- Xamarin.Forms Projects
- Scala程序員面試算法寶典
- AIRIOT物聯網平臺開發框架應用與實戰
- 詳解MATLAB圖形繪制技術
- Spring 5 Design Patterns
- Flask Web開發:基于Python的Web應用開發實戰(第2版)
- Maven for Eclipse
- 軟件測試分析與實踐
- Mastering SciPy
- Tableau Dashboard Cookbook
- Three.js權威指南:在網頁上創建3D圖形和動畫的方法與實踐(原書第4版)