Ethical Hacking Stages
Information Gathering (Reconnaissance)
Active
Passive
Scanning and Enumeration
NMAP
Nessus
Nikto
Gaining Access
Maintaining Access
Covering Tracks
Information Gathering
Passive Recon
Types of passive recon
Physical/Social
Location Information
satellite images
drone recon
building layout (badge reader, break areas, security, fencing)
Job information
Employees
name
job title
phone number
managers etc.
Pictures
badge photos
desk photos
computer photos etc
Web/Host
Target Validation
WHOIS
nslookup
dnsrecon
Finding Subdomains
Google fu
dig
nmap
sublist3r
bluto
crt.sh
Fingerprinting
nmap
wappalyzer
whatweb
builtwith
netcat
Data breaches
HavelBeenPwned
BreachParse
WeLeakInfo
dd
Identifying target
Bugcrowd> programs> Tesla
Email Gathering
common patterns of email addressees
Gathering Breached credentials
Last updated
Was this helpful?