So far, we have gathered information through some detective work, scanned a target to learn about where the live targets are and what they have left open, before trying to extract more detailed information through enumeration. During this process, we learned quite a bit, but we still have further to go as we learn more about both the process and how Kali NetHunter can assist us. We are now moving into the step where we actually put the penetration in penetration test by attempting to gain access to the target itself. Everything up to this point has allowed us to plan, learn, and prepare to make a successful attempt at entry.
Our goal is to gain access to a host and, if we have played our cards right so far, the information we have accumulated will help us. When we gain access to a system, there are a seemingly endless number of ways to accomplish this, but...