So far, we have just been using commands and tools to gather information about the victim. Now, we will make use you information that we get from URLs the victims browses, also how we can analyze the files from the targets machine to which we have access to and what useful information we can gather through them. We will then see how to use the gathered information to launch attacks.
Information gathering from target websites
Finding subdomains
In this section we're going to study subdomains. We see subdomains everywhere, for example, subdomain.target.com. Now, if we have beta.facebook.com, we would have mobile.facebook.com, or we might have user.facebook.com. Suppose we google mail.google.com, which just takes us to Gmail...