Section 2: Reconnaissance and Network Penetration Testing
This section teaches you how to perform information gathering on targets using a strategic approach with real-world examples. Additionally, you will learn how to perform device profiling, discover vulnerabilities, and exploit (system hacking).
This part of the book comprises the following chapters:
- Chapter 4, Reconnaissance and Footprinting
- Chapter 5, Exploring Active Information Gathering
- Chapter 6, Performing Vulnerability Assessments
- Chapter 7, Understanding Network Penetration Testing
- Chapter 8, Performing Network Penetration Testing