Learn Penetration Testing
上QQ阅读APP看书,第一时间看更新

Summary

In this chapter, we looked at information gathering and vulnerability scanning. We defined the difference between active and passive information gathering. We worked through the various tools that can be used for passive and active information gathering, and the tools that are needed for vulnerability scanning. Lastly, we worked through packet captures using graphical and command-line tools.

You now have the ability to perform information gathering using open source intelligence, which is passive information gathering. You have learned how to use Nmap for active information gathering, and how to leverage the Nmap scripting engine. You have gained the necessary skills to use vulnerability scanners such as OpenVAS and Nessus, and know how to perform a vulnerability scan to plan your attack. Packet capturing has taught you how to sniff traffic traversing a network, and how you can obtain valuable information from insecure protocols.

In the next chapter (Chapter 4, Mastering Social Engineering), we will look at what social engineering is and the different tools that you can use to perform social engineering. We will leverage built-in tools within Kali Linux, along with some additional tools that will need to be installed.