Book Image

Penetration Testing with BackBox

By : Stefan Umit Uygur
Book Image

Penetration Testing with BackBox

By: Stefan Umit Uygur

Overview of this book

Table of Contents (15 chapters)

Proceeding with a known system


We now have a lot more information about the previously unknown system. We haven't been through the information collection of the target in an accurate way because you can never have enough information. We can use many tools to collect a huge amount of information. However, we limit ourselves to the information we've collected until now and go one step further. Now, we know the information about the target company and we would like to know more information about the specific platform/OS used by the target.

Now we focus on our target domain, which is www.example.com, and also the IP address, which is 192.168.136.35. The next step is to find out everything we can about our target machine.

Nmap

To get a better understanding of the target environment, we will need to scan the target server and gather the information needed. To this purpose, the Nmap tool is our best friend, and a very powerful tool for network scanning.

In the menu, by navigating to Backbox | Auditing...