Summary
During this chapter, you have gained the hands-on skills as an aspiring ethical hacker and penetration tester to perform active scanning techniques to identify open ports, running services and operating system on targeted systems. In addition, you have learnt how to use common evasion techniques during scanning to reduce your threat level. Furthermore, you have discovered how to enumerate common network services and leverage the information on improve a cyber-attack.I trust that the knowledge presented in this chapter has provided you with valuable insights, supporting your path towards becoming an ethical hacker and penetration tester in the dynamic field of cybersecurity. May this newfound understanding empower you in your journey, allowing you to navigate the industry with confidence and make a significant impact. In the next chapter, Performing Vulnerability Assessments, you will learn how to setup and work with popular vulnerability management tools.