Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User:Hatter/Information Gathering"
From NetSec
(Created page with " =Networking Devices/Appliances= =Services= =Web Applications=") |
|||
| (2 intermediate revisions by one other user not shown) | |||
| Line 1: | Line 1: | ||
| + | Information gathering is typically broken into several categories, as information itself is also organised | ||
| + | * about a system | ||
| + | * about a network | ||
| + | * about a service | ||
| + | * about an application | ||
| + | * about users | ||
| − | |||
| − | = | + | =Linux Command-line= |
| + | ==host== | ||
| + | ==traceroute== | ||
| + | ==tcp traceroute== | ||
| + | ==mtr== | ||
| + | ==nmap== | ||
| + | ==nikto== | ||
| + | ==dig== | ||
| − | = | + | =Manual Inspection= |
| + | ==netcat/telnet== | ||
| + | ==tcpdump== | ||
| + | ==tamper data== | ||
Latest revision as of 03:32, 3 August 2012
Information gathering is typically broken into several categories, as information itself is also organised
- about a system
- about a network
- about a service
- about an application
- about users