Summary
Throughout this chapter, we discussed different types of techniques that attackers will use to compromise your privacy, various phases of attacks, and how information gathering is useful to conduct a successful attack by attackers. We listed the different types of tools that attackers will use to gather information, the important information that attackers will collect during another important phase, enumeration, and the various tools that can be useful. We also learned how identity exposure can be very critical for any organization. If devices are stolen or kept unattended, that can be a goldmine for attackers. On the other hand, if vulnerabilities are not available, attackers can create vulnerabilities using social engineering attacks.
In the next chapter, we will improve our knowledge of the different kinds of tools that attackers can use to compromise privacy.