Part 2: Scanning and Enumeration
In this section, you will learn how to perform advanced scanning techniques to discover hosts, identify security vulnerabilities on systems, enumerate common network services, collect intelligence on websites, and identify reconnaissance activities in a network.
This part has the following chapters:
- Chapter 7, Working with Active Reconnaissance
- Chapter 8, Performing Vulnerability Assessments
- Chapter 9, Delving into Website Reconnaissance
- Chapter 10, Implementing Recon Monitoring and Detection Systems