Chapter 5. Web Application Information Gathering

In this chapter, we will cover the following recipes:

  • Setting up API keys for recon-ng
  • Using recon-ng for reconnaissance
  • Gathering information using theharvester
  • Using DNS protocol for information gathering
  • Web application firewall detection
  • HTTP and DNS load balancer detection
  • Discovering hidden files/directories using DirBuster
  • CMS and plugins detection using WhatWeb and p0f
  • Finding SSL cipher vulnerabilities

Introduction

One of the most important phases of an attack is information gathering.

To be able to launch a successful attack, we need to gather as much as information as possible about our target. So, the more information we get, the higher the probability of a successful attack.

It is also important to note that not only gathering information but documenting it with clarity is of utmost importance. The Kali Linux release has several tools for documenting, collating and organizing information from various target machines, enabling a better reconnaissance. Tools such as Dradis, CaseFile, and KeepNote are some examples of it.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.97.219