Skip to content

Latest commit

 

History

History
40 lines (29 loc) · 2.09 KB

File metadata and controls

40 lines (29 loc) · 2.09 KB

5.2 - Information Gathering

Information Gathering

Topics

  1. Gathering Information on Your Targets
  2. Infrastructure
  3. Fingerprinting Frameworks and Applications
  4. Fingerprinting Custom Applications
  5. Enumerating Resources
  6. Information Disclosure Through Misconfiguration
  7. Google Hacking
  8. Shodan HQ
What is Information Gathering?
  • The initial phase of any penetration test involves information gathering. This step revolves around gathering data about an individual, company, website, or system that is the target of the assessment.
  • Success in the later stages of a penetration test is closely linked to the extent of information gathered about the target. In other words, the more comprehensive the data collected, the higher the chances of success.
  • Information gathering can be categorized into two main types: passive and active.

{% content-ref url="https://app.gitbook.com/s/PNcjhcAuvH4mlZKYrNu3/readme/assessment-methodologies-and-auditing/1.1-information-gathering" %} 1.1 Information Gathering {% endcontent-ref %}

{% content-ref url="https://app.gitbook.com/s/PNcjhcAuvH4mlZKYrNu3/readme/assessment-methodologies-and-auditing/1.2-footprinting-and-scanning" %} 1.2 Footprinting & Scanning {% endcontent-ref %}

{% content-ref url="https://app.gitbook.com/s/iS3hadq7jVFgSa8k5wRA/practical-ethical-hacker-notes/main-contents/2-footprinting-and-recon" %} 2 - Footprinting & Recon {% endcontent-ref %}

{% content-ref url="https://app.gitbook.com/s/PNcjhcAuvH4mlZKYrNu3/readme/assessment-methodologies-and-auditing/1.3-enumeration" %} 1.3 Enumeration {% endcontent-ref %}