Abstract
The information-gathering phase of penetration testing has one specific goal. It’s when a good penetration tester must learn as much about the client as possible. There are always many unanswered questions regarding the client. Their system must be running some software. What type of software are they using? They must comply with strict regulations regarding the usage of ports. Sometimes, the Internet-facing system listens to more ports than it should. Suppose a company is going to hire you to do some internal penetration tests. In such cases, you need to know the IP address of the domain controller.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Sanjib Sinha
About this chapter
Cite this chapter
Sinha, S. (2018). Information Gathering. In: Beginning Ethical Hacking with Kali Linux. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3891-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3891-2_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3890-5
Online ISBN: 978-1-4842-3891-2
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books