Basic Information Gathering Using Kali Linux Redteaming


We must thank IT virtualization as it led us to cloud technology. Today's IT infrastructures are already running their mission critical business applications on virtual machines. Like the physical infrastructure, virtualization is also cursed with cyber security challenges. This article talks about a typical open source virtualization solution and depicts the steps to secure its.


INFORMATION GATHERING ( REDHAWK ) USING KALI

Basic Reconnaisance:

GEO-IP LOOKING

GRAB BANNERS:

DNS LOOKUP:

SUBNET CALCULATOR:

NMAP PORT SCANNING:

SUBDOMAIN: