Stay in touch

Get our research, blog and event invitations before everybody else!

Your data will stay confidential Private and Confidential

Passive Information Gathering

Tuesday, August 16, 2011 By

The aim of this paper is to present the P.I.G. software, a private tool developed by High-Tech Bridge to optimize the information gathering phase during penetration tests. This paper only contains few technical information in order to provide a global view of the software implementation, which may be useful to people willing to automate such a process.


Author: Xavier Roussel, Junior Security Analyst


The aim of this paper is to present the P.I.G. software, a private tool developed by High-Tech Bridge to optimize the information gathering phase during penetration tests. This paper only contains few technical information in order to provide a global view of the software implementation, which may be useful to people willing to automate such a process.



User Comments
Add Comment

High-Tech Bridge on Facebook High-Tech Bridge on Twitter High-Tech Bridge on LinkedIn High-Tech Bridge RSS Feeds Send by Email
Share