Introduction
Exploiting networks is often a technique that comes in handy. A lot of times, we may find that the most vulnerable point in a corporate is in the network itself. In this recipe, you will learn about some of the ways in which we can pentest a network and successfully exploit the services we find.