In this chapter we will discuss various methods for enumerating and scanning a target or goal to gain as much information about the alive targets on a network as possible. This is also part of the information gathering phase, which, as I had mentioned, is key to a successful pentest. This chapter is very essential and is a building block for penetration testers, because later in Chapter 7 you will realize how the information we have gathered in this chapter helps us to compromise targets.
The main goal of this chapter is to learn the following:
- Host discovery
- Scanning for open ports
- Service and version detection
- OS detection
- Bypassing firewalls
We will use a variety of tools in demonstrating ...