Information Gathering

In the last chapter, we discussed the scoping and planning of a vulnerability management program. This chapter is about learning various tools and techniques for gathering information about the target system. We will learn to apply various techniques and use multiple tools to effectively gather as much information as possible about the targets in scope. The information gathered from this stage would be used as input to the next stage.

In this chapter, we will cover the following topics:

  • Defining information gathering
  • Passive information gathering
  • Active information gathering
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.69.143