@lanmaster53 |
[email protected] Reconnaissance (2/2) Reconnaissance (2/2) Objectives: Selection and veriļ¬cation (most important) of targets Information about technologies used and conļ¬gurations Lists of users, employees, and organization info Password reset information and contact information Trust relationships to exploit (friends, managers, partnerships, etc.) Code snippets with vulnerabilities and authentication information Port scans and service enumeration Technology enumeration Dynamic vulnerabilities Credentials Without engaging the target environment.