eWPT Web Application Penetration Tester
HomeCertifications
  • eLearnSecurity Web Application Penetration Tester (eWPT)
  • Before Start
    • Author
    • TryHackMe Machines
    • Hack The Box Machines
    • Join Us - Discord
    • Build Your Lab
  • 1️⃣Introduction
    • HTTP Cookies and Sessions
    • Same Origin Policy
    • Burp Suite
    • OWASP Zap
    • Introduction LAB
  • 2️⃣Information Gathering
    • 😀Information Gathering - Study Guide
    • 😀Web Application Information Gathering
    • 😀Subdomain Enumeration
    • 😀Web Application Fingerprint
    • 😀Crawling and Spidering
    • 😀Dirbuster
    • Information Gathering - LAB
  • Web Proxies
    • Page 1
  • 3️⃣Cross Site Scripting
    • Cross Site Scripting - Study
    • XSS Reflected and Persistent
    • XSS DOM
    • BEEF
    • Cross Site Scripting - LAB
  • 4️⃣SQL Injections
    • Page 2
  • 5️⃣Authentication and Authorization
    • Page 3
  • 6️⃣Session Security
    • Page 4
  • 7️⃣Flash
    • Flash - Study Guide
    • Flash Security and Attacks
  • 8️⃣HTML5
    • Page 6
  • 9️⃣File and Resources Attacks
    • File and Resources Attacks - Study Guide
    • File and Resources Attacks - Study
    • File and Resources Attacks - LAB
  • 🔟Other Attacks
    • Other Attacks - Study Guide
    • Clickjacking
    • Other Attacks
  • Web Services
    • Web Services - Study Guide
    • Web Services: SOAP
    • Web Services
  • XPath
    • XPath - Study Guide
    • XPATH and XCAT
    • XPath
  • Penetration Testing Content Management Systems
    • 😀Penetration Testing Content Management Systems - Study Guide
    • Capturing WordPress Credentials for Lateral Movement
    • Exploiting a Vulnerability in WordPress Core
    • Exploiting WordPress
    • Chaining Vulnerabilities To Remotely Extract WP Admin Credentials
  • Penetration Testing NoSQL Databases
    • Penetration Testing NoSQL Databases - Study Guide
    • Redis Exploitation - LAB
    • NoSQL Injections Against MongoDB - LAB
    • CouchDB Exploitation - LAB
Powered by GitBook
On this page
  • Passive
  • Active

Was this helpful?

  1. Information Gathering

Information Gathering - Study Guide

Information gathering, also known as reconnaissance or enumeration, is a crucial phase in the field of ethical hacking. It serves as the initial step in the process of securing systems and networks...

Information Gathering, also known as reconnaissance or enumeration, is a critical phase in the ethical hacking process. It involves systematically collecting and analyzing data about a target system or network to gather intelligence, identify vulnerabilities, and assess potential security risks. The purpose of information gathering in ethical hacking is to understand the target system's architecture, configuration, and potential weaknesses to assist in vulnerability assessment and penetration testing.

Information gathering can be passive or active, and it may involve both technical and non-technical methods.

Passive

Passive information gathering typically involves using publicly available information, such as domain name registrations, WHOIS records, DNS queries, search engine queries, social media profiles, and other publicly accessible data.

Active

Active information gathering, on the other hand, involves actively scanning and probing the target system or network using various techniques and tools to collect information, such as port scanning, service identification, OS fingerprinting, and network mapping.

Some common techniques used in information gathering in ethical hacking include:

  1. Open Source Intelligence (OSINT): Collect publicly available information from sources such as search engines, social media, online forums, and public databases.

  2. Network Scanning: Conduct scans of target networks to identify live hosts, open ports, and services running on those ports using tools like Nmap, Netcat, and Wireshark.

  3. Enumerating Services: Identifying services running on the target system and gathering information about their versions, configurations, and potential vulnerabilities using tools like banner grabbing, service fingerprinting, and protocol analysis.

  4. DNS Enumeration: Extracting DNS (Domain Name System) information from the target system or network to identify subdomains, mail servers, and other DNS-related information using tools like Dig, DNSenum, and DNSRecon.

  5. Social Engineering: Collecting information through social engineering techniques, such as phishing, pretexting, and elicitation, to exploit human vulnerabilities and gather sensitive information.

  6. WHOIS Lookup: Collect information about domain names, such as domain registrants, contact information, and registration dates, using WHOIS lookup tools.

  7. Google Hacking: Using advanced search techniques and operators in search engines like Google to discover vulnerabilities, misconfigurations, or sensitive information on the target system.

PreviousIntroduction LABNextWeb Application Information Gathering

Last updated 8 months ago

Was this helpful?

2️⃣
😀