Chapter 3Information Gathering

THIS CHAPTER COVERS THE FOLLOWING PENTEST+ EXAM TOPICS:

Domain 2: Information Gathering and Vulnerability Identification

  • images 2.1 Given a scenario, conduct information gathering using appropriate techniques.
    • Scanning
    • Enumeration
      • Hosts
      • Networks
      • Domains
      • Users
      • Groups
      • Network shares
      • Web pages
      • Applications
      • Services
      • Tokens
      • Social networking sites
    • Packet crafting
    • Packet inspection
    • Fingerprinting
    • Cryptography
      • Certificate inspection
    • Eavesdropping
      • RF communication monitoring
      • Sniffing
        • Wired
        • Wireless
    • Decompilation
    • Debugging
    • Open-Source Intelligence Gathering
      • Sources of research
        • CERT
        • NIST
        • JPCERT
        • CAPEC
        • Full Disclosure ...

Get CompTIA PenTest+ Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.