Information Gathering: Difference between revisions

From HackOps
Jump to navigation Jump to search
Created page with "[title]Information Gathering[/title] [txt] Information gathering is the initial phase of hacking and reconnaissance. It involves discovering the attack surface, identifying reachable hosts, and understanding the target environment — all without yet exploiting anything. This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data. Explore the key categories below: [/txt] [list] [li]DNS Reconnaissance..."
 
No edit summary
Line 1: Line 1:
[title]Information Gathering[/title]
= Information Gathering =


[txt]
Information gathering is the initial phase of hacking and reconnaissance.
Information gathering is the initial phase of hacking and reconnaissance.


Line 8: Line 7:
This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data.
This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data.


Explore the key categories below:
== Subcategories ==
[/txt]
* [[DNS Reconnaissance]] – Interrogate DNS to uncover subdomains, records, zones, and relationships.
* [[Network Scanning Tools]] – Use scanners like Nmap or Masscan to map open ports and services.
* [[OSINT Tools]] – Gather public data using platforms like theHarvester, SpiderFoot, and custom scripts.


[list]
== Purpose ==
[li][[DNS Reconnaissance]] – Interrogate DNS to uncover subdomains, records, zones, and relationships.[/li]
[li][[Network Scanning Tools]] – Use scanners like Nmap or Masscan to map open ports and services.[/li]
[li][[OSINT Tools]] – Gather public data using platforms like theHarvester, SpiderFoot, and custom scripts.[/li]
[/list]
 
[box]
[box-title]Purpose[/box-title]
[txt]
Gain visibility into the target system's structure without triggering alerts.
Gain visibility into the target system's structure without triggering alerts.


Every successful attack starts with knowing where to look — information gathering makes exploitation possible.
Every successful attack starts with knowing where to look — information gathering makes exploitation possible.
[/txt]
[/box]


[box]
== Common Goals ==
[box-title]Common Goals[/box-title]
* Discover live hosts   
[txt]
* Map open ports   
Discover live hosts   
* Identify subdomains   
Map open ports   
* Learn about operating systems   
Identify subdomains   
* Uncover public data on individuals and infrastructure
Learn about operating systems   
Uncover public data on individuals and infrastructure
[/txt]
[/box]

Revision as of 13:41, 11 May 2025

Information Gathering

Information gathering is the initial phase of hacking and reconnaissance.

It involves discovering the attack surface, identifying reachable hosts, and understanding the target environment — all without yet exploiting anything.

This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data.

Subcategories

  • DNS Reconnaissance – Interrogate DNS to uncover subdomains, records, zones, and relationships.
  • Network Scanning Tools – Use scanners like Nmap or Masscan to map open ports and services.
  • OSINT Tools – Gather public data using platforms like theHarvester, SpiderFoot, and custom scripts.

Purpose

Gain visibility into the target system's structure without triggering alerts.

Every successful attack starts with knowing where to look — information gathering makes exploitation possible.

Common Goals

  • Discover live hosts
  • Map open ports
  • Identify subdomains
  • Learn about operating systems
  • Uncover public data on individuals and infrastructure