Home > Articles

This chapter is from the book

Suggested Reading and Resources

http://www.domaintools.com/: Online Whois query website

https://nmap.org/book/man-port-scanning-techniques.html: Port-scanning techniques

https://www.exploit-db.com/google-hacking-database/: The Google Hacking Database

https://github.com/The-Art-of-Hacking/h4cker/tree/master/osint: Open Source Intelligence (OSINT) Resources

https://github.com/The-Art-of-Hacking/h4cker/tree/master/recon: Recon Resources

https://hackingscenarios.com: Ethical Hacking Katacoda Scenarios

https://github.com/The-Art-of-Hacking/h4cker/blob/master/cheat_sheets/NMAP_cheat_sheet.md: Nmap Cheat Sheet

https://osintframework.com/: OSINT Framework

https://blog.sucuri.net/2014/09/quick-analysis-of-a-ddos-attack-using-ssdp.html: Simple Service Discovery Protocol (SSDP) usage in scanning

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.