Scanning
The scanning phase starts after the reconnaissance of the target is completed. Attackers begin to scan the targets to find openings or vulnerabilities in their systems and networks that can be exploited. In this phase, you focus on getting more details about the target by using different techniques to scan ports, networks, Wi-Fi, and the cloud. Many tools are available to scan for vulnerabilities in a system and we will cover a few important ones in this chapter.
As we’ll focus on scanning, in this chapter, we will cover the following main topics:
- Scanning techniques
- Port scanning
- Vulnerability scanning
- Wi-Fi and cloud scanning
- Scanning exercises and best practices