During the earlier parts of this book, specifically in Chapter 5, Passive Information Gathering, and Chapter 6, Active Information Gathering, we discussed the importance of performing extensive reconnaissance on a target, whether it's a single system, network, or even a website. Each penetration test has a set of guidelines and stages. As you may recall, the following are the stages of penetration testing:
- Reconnaissance (information gathering)
- Scanning (and enumeration)
- Exploitation (gaining access)
- Maintaining access
- Covering tracks
Gathering as much information as possible about a target helps us to determine whether the target has any security vulnerabilities and whether it's possible to exploit them. In the following section, we will begin by learning how to discover technologies that are being used on a website.