General
Methodology
Information Gathering
passive
IP Addresses & DNS information
Domain Names & Domain ownership
Email address & Social Media Profiles
Web technologies
Subdomains
...
active
Discovering open ports
learning about internal infrastructure of the target
Enumerating information from target systems
...
others
identify real ip
for website
web technologies
vulnerabilities
working people & osint them
Footprinting & Scanning
Enumeration
Vulnerability Assessment
Last updated