Part 1: Recon and Exploitation
In this section, we will first explore open source intelligence (OSINT) concepts. We’ll then move on to networking. By the end of this section, you will be able to conduct sophisticated spoofing and footprinting techniques to understand the network and thus inform efforts to exploit targets.
This part of the book comprises the following chapters:
- Chapter 1, Open Source Intelligence
- Chapter 2, Bypassing Network Access Control
- Chapter 3, Sniffing and Spoofing
- Chapter 4, Windows Passwords on the Network
- Chapter 5, Assessing Network Security
- Chapter 6, Cryptography and the Penetration Tester
- Chapter 7, Advanced Exploitation with Metasploit