Let's move into actually using Kali NetHunter. We will start this journey by looking at the tools that are useful for gathering intelligence from a target host or network. The tools we will be encountering in this chapter will be those that tend to be deployed during the first phase of pentesting, with the potential to be deployed again during later phases.
In this chapter, we will cover the following topics:
- Objectives of intelligence gathering
- Tools for gathering useful information
- Downloading and copying a website
- Google hacking
- Social networking
- Using WHOIS
- nslookup