
Introduction
In this chapter, we’ll discuss what’s called pre-assessment information-gathering
techniques. During this phase of an assessment, the security tester is most inter-
ested in obtaining preliminary information about the target.This does not
include specific information such as IP addresses and DNS names ...