Part 2: Breaking and Entering
This part takes you onto the next steps of ethical hacking. Here, we will begin by focusing on reconnaissance, then moving on to scanning techniques, and finally gaining initial access. It will focus on the various types of reconnaissance, scanning, and gaining access that can be performed as part of an ethical hack. It will take you on a journey through the use of various tools and techniques.
This part contains the following chapters:
- Chapter 4, Reconnaissance
- Chapter 5, Scanning
- Chapter 6, Gaining Access