Summary
Over the course of this chapter, you learned how to perform web and domain reconnaissance using both passive and active information-gathering techniques. Additionally, you gained the hands-on skills that are needed by ethical hackers to identify the attack surface of a target and its sub-domains and discover hidden files and directories. Lastly, you explored how web reconnaissance frameworks can be used by ethical hackers to automate the discovery of an attack surface for a target.
I hope this chapter has been informative for you and helpful in your journey in the cybersecurity industry. In the next chapter, Implementing Reconnaissance Monitoring and Detection Systems, you will learn how to implement various open source threat monitoring tools to identify network intrusions and determine whether reconnaissance-based attacks are happening within your organization.