Chapter 3. Information Gathering

Many companies only concentrate on protecting their systems from a specific exploit when they start building a security infrastructure. They figure out what patches need to be applied to their systems, and after they apply them, they think they are secure. However, they do not realize that through reconnaissance and information gathering, an attacker can acquire a large amount of information about their sites.

Before an attacker can run an exploit, he needs to understand the environment he is going after. In doing so, he needs to gather preliminary information about the number of machines, type of machines, ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.