Summary 

In this chapter, we have covered all the possible techniques that we can use to break through network and gather important pieces of information about the clients on the network. This will help us to launch attacks on the target system. For this purpose, we learned about three different tools—netdiscover, AutoScan, and Zenmap. All these tools have unique features that make them efficient in gathering information about targets. 

In the next chapter, we are going to learn about various man-in-the-middle attacks. We will also be learning about the Wireshark tool.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.134.78.106