Chapter 4. Information Gathering
In this chapter, we will cover:
- Service enumeration
- Determining network range
- Identifying active machines
- Finding open ports
- Operating system fingerprinting
- Service fingerprinting
- Threat assessment with Maltego
- Mapping the network