O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Information Gathering

In this chapter, we will cover:

  • Service enumeration
  • Determining the network range
  • Identifying active machines
  • Finding open ports
  • Operating system fingerprinting
  • Service fingerprinting
  • Threat assessment with Maltego
  • Mapping the network

Introduction

One of the most important stages of an attack is information gathering. To be able to launch an attack, we need to gather basic information about our target. So, the more information we get, the higher the probability of a successful attack.

I also want to emphasize an important aspect of this stage, and it's the documentation. The latest BackTrack release available at the time of writing this book includes a few tools to help us collate and organize the data from the target, allowing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required