From the course: Kali Linux Essential Training

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Information gathering with Kali

Information gathering with Kali - Linux Tutorial

From the course: Kali Linux Essential Training

Information gathering with Kali

- [Malcolm] The first task for an adversary will be to check out the target in order to prepare an attack. This is known as the reconnaissance phase. Gathering information on the target can be done using open source intelligence or using tools which probe the target directly. When we're testing for vulnerabilities, it's useful to look at the target from an adversarial perspective to understand how much information can be found. Kali provides a large number of information gathering tools in the first group of its application menu. And these can be used to profile a target system. We can find DNS information to identify hosts in the domain. Identify any IDS systems in use. Identify which hosts are active. And scan for services running on hosts with tools such as Nmap. We can collect all relevant open source intelligence. Discover routing information and check on the specifics of various protocols which may be running. Let's…

Contents