- Kali Linux Intrusion and Exploitation Cookbook
- Ishan Girdhar Dhruv Shah
- 49字
- 2021-07-09 18:26:38
Chapter 2. Network Information Gathering
In this chapter, we will cover the following recipes:
- Discovering live servers over the network
- Bypassing IDS/IPS/firewall
- Discovering ports over the network
- Using unicornscan for faster port scanning
- Service fingerprinting
- Determining the OS using nmap and xprobe2
- Service enumeration
- Open-source information gathering