Methodology: detects, scans (port scans, vulnerability scans), and maintains access.
I. Investigation
Active investigation: Directly Interacts with the target, and the behavior may be recorded by the target.
Passive detection: attackers can obtain massive amounts of information from the Internet and do not directly interact with the target.
Information Mining:
Httrack
Google
Site: domain (terms to search)
Intitle/allintile: The title (completely) has the required keyword.
Inurl
(See: http://wenku.baidu.com/link? Url = q478n56Fr_v2ghgyRzuBC673ajpPMh20zSkoUilK1DulWNxu5qIKQspUIFU-D-ngvMrOcVtQQPI8WkfYTdLVOCzbLzifsjv4OS3r3TRsXKi)
Cache: allows Google to only display information in Web snapshots
Filetype: Search for the extension of a specific file. For example, filetype: PDF.
The preceding command can be used in combination: site: dsu.edu filetype: PPT
The Harvester
A very foreign tool, BT5 loading, but Google does not seem to work as an engine ..
Whois
IP address, company DNS host name, address, and phone number
Netcraft
Www.news.netcraft.com
Host Tool
Collect host names and translate them into IP addresses. Host target_hostname.
You can also translate an IP address into a host name. Host IP Address
Extract information from DNS:
NS Lookup
You may obtain records of Various hosts that the DNS server knows.
Dig
Query region transfer information: Dig @ 192.168.1.23 example.com-T axfr
Metagoofil
Extract metadata.
Social Engineering
Penetration test practice guide d01