In this chapter, you will learn how to
• Explain the importance of conducting reconnaissance
• Identify open source intelligence gathering techniques
• Use tools to automate methods for collecting information
• Describe methods and techniques for conducting metadata analysis
Before you start scanning a customer’s network or throwing exploits at it, you need to strategize your plan of attack. As a penetration tester, understanding your customer’s business model, the products, services, and technologies they utilize and/or develop, and the social media outlets they use for marketing and customer relations can go a long way in helping you to visualize the external attack surface of the target organization as ...