Summary

In this chapter, we learned about the recon process. We started with active recon using HTTP headers and discovering Git repos. Then, we moved on to passive scans, where we looked at Shodan and SSL analysis, and used archived web pages to obtain information relating to a target.

In the next chapter, we'll learn how we can perform web-based enumeration using Metasploit. We'll be focusing on HTTP method enumeration, file and directory enumeration, subdomain enumeration, and more.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.196.184