Summary
In this chapter, we covered a few scanning options. We started by explaining scanning techniques and network mapping. We then worked through the various tools that provided different techniques to scan ports, Wi-Fi, and the cloud, which helped us know how to start using such tools for the ethical hacking exercises. Going through what was covered in this chapter not only gave you the skills required to perform scanning but also made you familiar with the best practices to protect your network against scanning techniques and tools.
In the next chapter, we will take our reconnaissance activity to the next level by starting to use the vulnerability or weakness we’ve discovered to gain access.