Section 2: Thinking Like a Hacker – Network Information Gathering and Attacks
The aim of this section is to develop hands-on tools to be used for penetration testing. This section will start with applying information gathering techniques for developing programs that will enable the hacker to attack the victim machine and take control of the victim machine remotely. During this section, you will learn how to successfully attack a machine and get access to most parts of the victim's machine without them noticing.
This part of the book comprises the following chapters:
- Chapter 3, Reconnaissance and Information Gathering
- Chapter 4, Network Scanning
- Chapter 5, Man in the Middle Attacks