How I met your shell
search
⌘Ctrlk
How I met your shell
  • From beginners to beginners
  • Introduction & Getting Started
    • Shells & SSH
    • Knowledge Check
  • Enumeration & Attack Planning
    • Nmap
    • Footprinting
      • Infrastructure-Based Enumration
        • Domain Information
        • Cloud Resources
      • Host-Based Enumeration
      • Skill Assessments
    • Information Gathering - Web Edition
    • Password Attacks
  • Exploitation & Lateral Movement
    • Web Shells & Payloads
    • Metasploit
  • Post exploitaion
    • File Transfers
    • Pivoting, Tunneling & Port Forwarding
  • Reporting
    • In-Progress...
  • Malware Analysis Prep
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Enumeration & Attack Planningchevron-right
  2. Footprinting

Infrastructure-Based Enumration

Domain Informationchevron-rightCloud Resourceschevron-right
PreviousFootprintingchevron-leftNextDomain Informationchevron-right