Summary

In this chapter, we discussed the target-discovery process. We started by discussing the purposes of target discovery: identifying the target machine and finding out the operating system used by the target machine. Then, we continued with the tools included with Kali Linux and GitHub that can be used for discovering and identifying target machines.

We discussed several tools for host discovery and scanning, such as ping, Nmap, p0f, and Striker, and also looked at masking your IP and DNS using Nipe to evade detection.

In the next chapter, we will talk about vulnerability scanning and the tools that can be used in Kali Linux for this purpose.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.191.22