General

Methodology

Information Gathering

passive

  • IP Addresses & DNS information

  • Domain Names & Domain ownership

  • Email address & Social Media Profiles

  • Web technologies

  • Subdomains

  • ...

active

  • Discovering open ports

  • learning about internal infrastructure of the target

  • Enumerating information from target systems

  • ...

others

identify real ip

for website

  • web technologies

  • vulnerabilities

  • working people & osint them

Footprinting & Scanning

Enumeration

Vulnerability Assessment

Last updated