Information gathering from target websites
So far, we have just been using commands and tools to gather information about the victim. Now, we will make use you information that we get from URLs the victims browses, also how we can analyze the files from the targets machine to which we have access to and what useful information we can gather through them. We will then see how to use the gathered information to launch attacks.
Finding subdomains
In this section we're going to study subdomains. We see subdomains everywhere, for example, subdomain.target.com
. Now, if we have beta.facebook.com
, we would have mobile.facebook.com
, or we might have user.facebook.com
. Suppose we google mail.google.com
, which just takes us to Gmail. Why subdomains are important is, in a lot of cases, websites have subdomains for their own users, for example, for employees or for certain customers, so they're not advertised unless it's some sort of a VIP customer or we are an employee. We will not see these subdomains...