Mastering Kali Linux for Advanced Penetration by Vijay Kumar Velu

Mastering Kali Linux for Advanced Penetration by Vijay Kumar Velu

Author:Vijay Kumar Velu
Language: eng
Format: epub
Tags: COM051310 - COMPUTERS / Programming Languages / C#, COM051240 - COMPUTERS / Software Development & Engineering / Systems Analysis & Design, COM051440 - COMPUTERS / Software Development & Engineering / Tools
Publisher: Packt
Published: 2022-02-14T14:59:17+00:00


The first step is to conduct the passive and active reconnaissance previously described (refer to Chapter 2, Open-Source Intelligence and Passive Reconnaissance, and Chapter 3, Active Reconnaissance of External and Internal Networks).

In particular, ensure that hosted sites are identified, and then use DNS mapping to identify all the hosted sites that are delivered by the same server. One of the most common and successful means of attack is to attack a non-target site hosted on the same physical server as the target website, exploit weaknesses in the server to gain root access, and then use the escalated privileges to attack the targeted site.

This approach works pretty well in a shared cloud environment, where many applications are hosted on the same Software as a Service (SaaS) model.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.