Information Gathering: Difference between revisions
Jump to navigation
Jump to search
Created page with "[title]Information Gathering[/title] [txt] Information gathering is the initial phase of hacking and reconnaissance. It involves discovering the attack surface, identifying reachable hosts, and understanding the target environment — all without yet exploiting anything. This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data. Explore the key categories below: [/txt] [list] [li]DNS Reconnaissance..." |
No edit summary |
||
Line 1: | Line 1: | ||
= Information Gathering = | |||
Information gathering is the initial phase of hacking and reconnaissance. | Information gathering is the initial phase of hacking and reconnaissance. | ||
Line 8: | Line 7: | ||
This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data. | This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data. | ||
== Subcategories == | |||
[ | * [[DNS Reconnaissance]] – Interrogate DNS to uncover subdomains, records, zones, and relationships. | ||
* [[Network Scanning Tools]] – Use scanners like Nmap or Masscan to map open ports and services. | |||
* [[OSINT Tools]] – Gather public data using platforms like theHarvester, SpiderFoot, and custom scripts. | |||
== Purpose == | |||
Gain visibility into the target system's structure without triggering alerts. | Gain visibility into the target system's structure without triggering alerts. | ||
Every successful attack starts with knowing where to look — information gathering makes exploitation possible. | Every successful attack starts with knowing where to look — information gathering makes exploitation possible. | ||
== Common Goals == | |||
* Discover live hosts | |||
* Map open ports | |||
* Identify subdomains | |||
* Learn about operating systems | |||
* Uncover public data on individuals and infrastructure | |||
Revision as of 13:41, 11 May 2025
Information Gathering
Information gathering is the initial phase of hacking and reconnaissance.
It involves discovering the attack surface, identifying reachable hosts, and understanding the target environment — all without yet exploiting anything.
This phase includes both passive and active techniques, using tools to enumerate DNS, scan ports, and harvest open data.
Subcategories
- DNS Reconnaissance – Interrogate DNS to uncover subdomains, records, zones, and relationships.
- Network Scanning Tools – Use scanners like Nmap or Masscan to map open ports and services.
- OSINT Tools – Gather public data using platforms like theHarvester, SpiderFoot, and custom scripts.
Purpose
Gain visibility into the target system's structure without triggering alerts.
Every successful attack starts with knowing where to look — information gathering makes exploitation possible.
Common Goals
- Discover live hosts
- Map open ports
- Identify subdomains
- Learn about operating systems
- Uncover public data on individuals and infrastructure