Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User:Hatter/Information Gathering"
From NetSec
| (One intermediate revision by one other user not shown) | |||
| Line 1: | Line 1: | ||
| + | Information gathering is typically broken into several categories, as information itself is also organised | ||
| + | * about a system | ||
| + | * about a network | ||
| + | * about a service | ||
| + | * about an application | ||
| + | * about users | ||
| + | |||
| + | |||
=Linux Command-line= | =Linux Command-line= | ||
==host== | ==host== | ||
| Line 6: | Line 14: | ||
==nmap== | ==nmap== | ||
==nikto== | ==nikto== | ||
| + | ==dig== | ||
| + | |||
=Manual Inspection= | =Manual Inspection= | ||
==netcat/telnet== | ==netcat/telnet== | ||
==tcpdump== | ==tcpdump== | ||
==tamper data== | ==tamper data== | ||
Latest revision as of 03:32, 3 August 2012
Information gathering is typically broken into several categories, as information itself is also organised
- about a system
- about a network
- about a service
- about an application
- about users