This article discusses the use of tools that can help gather information about a target for exploitation or other purposes, such as finding all social media accounts belonging to the target
I will provide several lists of users and passwords that can be used to bypass when we have successfully found the user and password form of the system that we have found login access
is a reconnaissance tool or often known as Subfinder. It is a subdomain enumerator to find subdomains from the main domain of the target we are targeting.
nowledge about internet networks will certainly be very complex and more and more must be learned along with the development of technology and the needs of its use
At this stage I will explain what I did on day 2 of learning ethical hacking as a pentester. What I explain here is large-scale in the scope of practice, so to deepen it requires exploration from each of us to dig deeper in learning.