
上QQ阅读APP看书,第一时间看更新
Chapter 2. Network Information Gathering
In this chapter, we will cover the following recipes:
- Discovering live servers over the network
- Bypassing IDS/IPS/firewall
- Discovering ports over the network
- Using unicornscan for faster port scanning
- Service fingerprinting
- Determining the OS using nmap and xprobe2
- Service enumeration
- Open-source information gathering