Reconnaissance and Information Gathering
Previous chapters introduced you to Bash scripting concepts. In some cases, we ran applications that were not made with Bash. In those cases, we used Bash to execute programs, pipe data between applications, or parse the output of these tools. As we progress further into this book, we will be demonstrating less pure Bash and more on using Bash to execute our pentesting tools, automate them, and parse their output.
In this chapter, we dive into the essential first step of any pentest: reconnaissance. You’ll learn how to discover email addresses and assets owned by your target organization using various tools and techniques. This foundational knowledge will set the stage for more active assessments in later chapters.
Important note
Don’t expect this and the following chapters to be a thorough reference on performing pentesting. I will not be demonstrating every step, technique, and tool here. This book is meant to teach...