Chapter 3: Exploring Pentesting and AWS
Welcome to the next portion of the journey. Here, we will begin to take the knowledge that we learned from the previous two chapters and start applying it to further our knowledge about pentesting and AWS. It is important that you understand the previous two chapters because we will be building more instances throughout this book and will be using the pentesting methodology you read about in Chapter 2, Pentesting and Ethical Hacking.
For this chapter, we are going to focus on what it means to scan and enumerate information from the host that we built, as well as other general systems. Scanning and enumerating is one of the most important steps in pentesting, so it's crucial that we take a trip down recon lane to understand various ways to enumerate and understand our enumeration tactics. We will also learn about various attack paths in both pentesting and adversarial assessments and mindsets. It's crucial to understand that reconnaissance...