O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter introduced you to the information gathering phase. It is usually the first phase done during the penetration testing process. In this phase, we will collect as much information as we can about the target organization.

We describe several tools included in BackTrack 4 that can be used for information gathering. We start by describing a tool that can be used to gather metadata from documents. Next, we describe how to use tools that collect DNS information. Later on, we move to describe tools for collecting routing information and tools that utilize search engines. Then we move to describe tool for all-in-one intelligence gathering. In the final part of the chapter, we describe a tool that is very useful in documenting all of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required