Denial-of-Service Tools 51
Encryption Testing 55
Packet Captures 60
Using tcpdump 61
Berkeley Packet Filters 63
Wireshark 65
Poisoning Attacks 68
ARP Spoofing 69
DNS Spoofing 72
Summary 73
Useful Resources 74
3.
Reconnaissance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
What Is Reconnaissance? 75
Open Source Intelligence 77
Google Hacking 79
Automating Information Grabbing 81
Recon-NG 85
Maltego 88
DNS Reconnaissance and whois 92
DNS Reconnaissance 92
Regional Internet Registries 96
Passive Reconnaissance 99
Port Scanning 101
TCP Scanning 102
UDP Scanning 102
Port Scanning with Nmap 103
High-Speed Scanning 106
Service Scanning 109
Manual Interaction 110
Summary 112
Useful Resources 113