In this section, we will learn how to gather, store, and process information. We'll also look at how to deploy payloads to a target and remove the fingerprints of a NetHunter attack.
The following chapters are in this section:
- Chapter 3, Intelligence Gathering Tools
- Chapter 4, Scanning and Enumeration Tools
- Chapter 5, Gaining Access to a Victim
- Chapter 6, Maintaining Control of a Victim
- Chapter 7, Clearing Tracks and Removing Evidence from a Target