Summary

This chapter focused on gathering information. Firstly, we used tools such as WhoIs Lookup, Netcraft, and Robtex. Then, we focused on how we can use the websites hosted on a server to exploit that particular server. We then learned about domains and how they can act as an important source of information that can we use to attack a victim. Later, we studied how to access files on a target system or target websites, and also how to analyze important information from various files.

Now, in the next chapter, we are going to see how important and powerful information gathering can be to launch attacks on victims.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.128.199.88