From the course: Kali Linux Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Information gathering with Kali - Linux Tutorial
From the course: Kali Linux Essential Training
Information gathering with Kali
- [Malcolm] The first task for an adversary will be to check out the target in order to prepare an attack. This is known as the reconnaissance phase. Gathering information on the target can be done using open source intelligence or using tools which probe the target directly. When we're testing for vulnerabilities, it's useful to look at the target from an adversarial perspective to understand how much information can be found. Kali provides a large number of information gathering tools in the first group of its application menu. And these can be used to profile a target system. We can find DNS information to identify hosts in the domain. Identify any IDS systems in use. Identify which hosts are active. And scan for services running on hosts with tools such as Nmap. We can collect all relevant open source intelligence. Discover routing information and check on the specifics of various protocols which may be running. Let's…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Information gathering with Kali1m 19s
-
(Locked)
Using deep magic for reconnaissance2m 17s
-
(Locked)
Using DNS for passive reconnaissance3m 20s
-
(Locked)
Using Shodan to enumerate the internet4m 30s
-
(Locked)
Active target reconnaissance7m 9s
-
(Locked)
Taking a quick peek at a web server1m 46s
-
(Locked)
-
-
-
-
-