Before you can effectively deploy any tools used to break into a system or otherwise compromise it, you must learn whatever information you can about it. Depending on the amount of care you take and depth you need to go into, this process can take a short period of time or a considerable period of time. To accelerate this process, NetHunter provides a full range of tools designed just for this purpose.
Since we don't have a specific target in mind for this book, we will explore a range of tools designed to gather different types of information. We will assume that there is a good amount of information to be gathered about the target and we must simply deploy the right tools to get it. Keep in mind that, in the real world, you may be approached to perform a pentest using one of three popular approaches based on the client's needs....