SMK Muhammadiyah 2 Palembang
search
Ctrlk
  • Introducation
  • The Basicschevron-right
  • Windowschevron-right
  • Scripting With Pythonchevron-right
  • Recon and Information Gathering Phasechevron-right
    • Passive information gathering
    • Identify IP-addresses and Subdomainschevron-right
      • Dorking Find Subdomains
      • Find Subdomains
      • DNS Basics
      • DNS Zone Transfer Attack
      • Identifying People
      • Search Engine Discovery
      • Active information gathering
      • Port Scanning
  • Vulnerability analysischevron-right
  • Password Crackingchevron-right
  • Pivoting - Port forwarding - Tunnelingchevron-right
  • Network trafficchevron-right
  • Wifichevron-right
  • Physical access to machine
  • Literature
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Recon and Information Gathering Phase

Identify IP-addresses and Subdomains

Dorking Find Subdomainschevron-rightFind Subdomainschevron-rightDNS Basicschevron-rightDNS Zone Transfer Attackchevron-rightIdentifying Peoplechevron-rightSearch Engine Discoverychevron-rightActive information gatheringchevron-rightPort Scanningchevron-right
PreviousPassive information gatheringchevron-leftNextDorking Find Subdomainschevron-right

Last updated 3 years ago