Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues \( PDFDrive.com \).epub by Unknown

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues \( PDFDrive.com \).epub by Unknown

Author:Unknown
Language: eng
Format: epub
Published: 2018-11-20T07:09:43+00:00


CHAPTER 8

Information Gathering

The information-gathering phase of penetration testing has one specific goal. It’s when a good penetration tester must learn as much about the client as possible. There are always many unanswered questions regarding the client. Their system must be running some software. What type of software are they using? They must comply with strict regulations regarding the usage of ports. Sometimes, the Internet-facing system listens to more ports than it should. Suppose a company is going to hire you to do some internal penetration tests. In such cases, you need to know the IP

address of the domain controller.

Information gathering (also called intelligence gathering or reconnaissance) is the first step of the kill chain when conducting a penetration test against a data target.

Note I have already discussed a few steps of information gathering in previous chapters, but this time you will see it in a more structured and detailed way, building on what you already know with plenty of examples.

Penetration testing starts with manual and automated testing. The next steps include network-focused testing, application-focused testing, and physical testing. The last part includes social engineering. This is more or less an overview of penetration testing.

© Sanjib Sinha 2018

189

S. Sinha, Beginning Ethical Hacking with Kali Linux,

https://doi.org/10.1007/978-1-4842-3891-2_8



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Eco-friendly approach of bio-indigo synthesis and developing purification methods towards isolation of indigo from indirubin and bacterial fragments by Ramalingam Manivannan & Kaliyan Prabakaran & Young-A Son(160444)
Personalized inhaled bacteriophage therapy for treatment of multidrug-resistant Pseudomonas aeruginosa in cystic fibrosis by unknow(157787)
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(74279)
CONSORT 2025 statement: updated guideline for reporting randomized trials by unknow(66081)
Critical evaluation of the ProfiLER-02 study design and outcomes by Vivek Subbiah & Razelle Kurzrock(65831)
Cardiac gene therapy makes a comeback by Oliver J. Müller & Susanne Hille & Anca Kliesow Remes(65269)
Unveiling the design rules for tunable emission in graphene quantum dots: A high-throughput TDDFT and machine learning perspective by Şener Özönder & Mustafa Coşkun Özdemir & Caner Ünlü(50860)
A yeast-based oral therapeutic delivers immune checkpoint inhibitors to reduce intestinal tumor burden by unknow(40223)
Covalent hitchhikers guide proteins to the nucleus by Alexander F. Russell & Madeline F. Currie & Champak Chatterjee(40191)
Meet the Authors: Christopher R. Mansfield and Emily R. Derbyshire by Christopher R. Mansfield & Emily R. Derbyshire(40057)
What's Done in Darkness by Kayla Perrin(27106)
Topological analysis of non-conjugated ethylene oxide cored dendrimers decorated with tetraphenylethylene: Insights from degree-based descriptors using the polynomial approach by A Theertha Nair & D Antony Xavier & Annmaria Baby & S Akhila(26484)
Investigation of mechanical and self-healing properties of hydroxyl-terminated polybutadiene functionalized with 2-ureido-4-pyrimidinone by Mohsen Kazazi & Mehran Hayaty & Ali Mousaviazar(26435)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(21018)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20777)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20648)
The Fifty Shades Trilogy & Grey by E L James(19605)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19487)
Shot Through the Heart by Mercy Celeste(19349)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17492)