5-Stages of Ethical Hacking

- Reconnaisance (Activate vs Passive)
- Scanning and Enumaration (nmap, nessus)
- Gaining Access (Exploitation)
- Maitaning Access
- Covering tracs (cleaning up)
Information Gathering
Passive Recon
Types: Physical/Social
-
Location information:
- satellite images, drone recon
- building layout
-
Job Information
- Employees (names, jobtitle, phone number, etc)
- Pictures (badges photoes, desk photos, computer, etc)
Web/Host

Bugcrowd for programs and targets
Discoverig Email Addresses
Hunter for email discovery and verify or Phonebook for chrome as an extesnion clearbit another one verifyemail
Hunting breached credentials

Hunting subdomains
apt istall sublister
- Get subdomains with wublist3r

Search by certificate with crt.sh

- The go to tool is OWASP-AMASS

Identify built with
Check builtwith and wappalyzer for firefox
whatweb on kali
