Security Attacks
Basic Information Gathering Using Kali Linux Redteaming

We must thank IT virtualization as it led us to cloud technology. Today's IT infrastructures are already running their mission critical business applications on virtual machines. Like the physical infrastructure, virtualization is also cursed with cyber security challenges. This article talks about a typical open source virtualization solution and depicts the steps to secure its.

INFORMATION GATHERING (REDHAWK ) USING KALI

Basic Reconnaissance
GEO-IP Looking
GRAB Banners
DNS Lookup
Subdomain
Subnet Calculator
Nmap Port Scanning