A Penetration Test almost always needs to begin with an extensive Information Gathering phase. This post talks about how Open Sources of information on the Internet can be used to build a profile of the target. The gathered data can be used to identify servers, domains, version numbers, vulnerabilities, mis-configurations, exploitable endpoints and sensitive information leakages. Read on! There is
![open-source-intelligence-gathering-101-d2861d4429e3](https://cdn-ak-scissors.b.st-hatena.com/image/square/9dc9e9c74cc9268aebef11004395a7eb1d2380ea/height=288;version=1;width=512/https%3A%2F%2Fmiro.medium.com%2Fv2%2Fresize%3Afit%3A812%2F1%2A6bs36VMpBtnaSyibHsd3aw.png)