Reconnaissance Tasks

This chapter covers the following recipes:

  • Performing IP address geolocation
  • Getting information from WHOIS records
  • Obtaining traceroute geolocation information
  • Querying Shodan to obtain target information
  • Checking whether a host is flagged by Google Safe Browsing for malicious activities
  • Collecting valid e-mail accounts and IP addresses from web servers
  • Discovering hostnames pointing to the same IP address
  • Discovering hostnames by brute forcing DNS records
  • Obtaining profile information from Google's People API
  • Matching services with public vulnerability advisories

Get Nmap: Network Exploration and Security Auditing Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.