Gathering information

During the early parts of this book, we discussed in depth the importance of gathering information about a target using both passive and active techniques and tools in Kali Linux. However, when you've compromised a system via exploitation, it isn't the end of the penetration test. Rather, it's the point from which you will continue onward to exploit different systems on the organization's network, create multiple back doors, and gain the highest privileges on various victim devices.

In this section, we are going to perform network scanning using the following tools:

  • Netdiscover
  • AutoScan
  • Zenmap

Let's look at each of these in more detail.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.3.208