Reconnaissance

In this chapter, we will cover:

  • Passive reconnaissance
  • Using Recon-ng to gather information
  • Scanning and identifying services with Nmap
  • Identifying web application firewalls
  • Identifying HTTPS encryption parameters
  • Using the browser's developer tools to analyze and alter basic behavior
  • Obtaining and modifying cookies
  • Taking advantage of robots.txt
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.162.110