In this write-up, I’ll go through the best tools used by penetration tester to do Information Gathering.
Identifying Our Target:
please double check when you read this if tesla still exists…
There are so many types of Passive Recon. we will go through physical and social Recon. Physical meaning actually going on-site and doing a physical engagement or the social engineering aspect or maybe doing phishing assessment or even including in a physical engagement just gathering this information from the physical…
In these five stages, we actually start with
this stage is also known as Information gathering, there are two different types of Recon. Active and Passive
- Passive Recon. : when you going to google and search for something, say you are given a client and you are looking there…
The OSI Model
If you read what I wrote before you will see that I spooked a lot about layer three or layer two, but what is these layer, these all correspond with what is called OSI model, Now if you ever in network interview or you have talked with…
TCP vs UDP
When we talking about TCP and UDP we actually talking about layer three of the OSI model which is the Transport layer.
What is TCP: Transmission Control Protocol is one of the main protocols of the Internet protocol suite. it is a connection-oriented protocol.
What is UDP…
To bring up your IP address type $ifconfig in your terminal & in Windows >ipconfig
inet -> for IPv4
inet6 -> for IPv6
this is how to communicate devices communicating, we communicate over layer 3 (Network Layer [Routing])
IPv4 is in deceminal notation 8bit.8bit.8bit.8bit = 32byte
11111111 = 8bit