Part 1: Reconnaissance and Footprinting
In this section, you will learn about the importance of reconnaissance and how ethical hackers use it to identify the attack surface of organizations, locate persons of interest, and perform wireless signals intelligence.
This part has the following chapters:
- Chapter 1, Fundamentals of Reconnaissance
- Chapter 2, Setting Up a Reconnaissance Lab
- Chapter 3, Understanding Passive Reconnaissance
- Chapter 4, Domain and DNS Intelligence
- Chapter 5, Organizational Infrastructure Intelligence
- Chapter 6, Imagery, People, and Signals Intelligence