Summary
During this chapter, you learned about the importance of active reconnaissance and how it helps ethical hackers to discover live hosts and identify open ports and running services. In addition, you gained the skills to perform reconnaissance on wireless network infrastructure to identify targeted access points and clients, as well as network settings.
I hope this chapter has been informative for you and helpful in your journey in the cybersecurity industry. In the next chapter, Performing Vulnerability Assessments, you will learn how to set up and work with vulnerability assessment tools.