Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User:Hatter/Information Gathering"
From NetSec
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
+ | Information gathering is typically broken into several categories, as information itself is also organised | ||
+ | * about a system | ||
+ | * about a network | ||
+ | * about a service | ||
+ | * about an application | ||
+ | * about users | ||
+ | |||
+ | |||
=Linux Command-line= | =Linux Command-line= | ||
==host== | ==host== | ||
Line 6: | Line 14: | ||
==nmap== | ==nmap== | ||
==nikto== | ==nikto== | ||
+ | ==dig== | ||
+ | |||
=Manual Inspection= | =Manual Inspection= | ||
==netcat/telnet== | ==netcat/telnet== | ||
==tcpdump== | ==tcpdump== | ||
==tamper data== | ==tamper data== |
Latest revision as of 03:32, 3 August 2012
Information gathering is typically broken into several categories, as information itself is also organised
- about a system
- about a network
- about a service
- about an application
- about users