In this chapter, you will learn how to

•  Explain the importance of conducting reconnaissance

•  Identify open source intelligence gathering techniques

•  Use tools to automate methods for collecting information

•  Describe methods and techniques for conducting metadata analysis



Before you start scanning a customer’s network or throwing exploits at it, you need to strategize your plan of attack. As a penetration tester, understanding your customer’s business model, the products, services, and technologies they utilize and/or develop, and the social media outlets they use for marketing and customer relations can go a long way in helping you to visualize the external attack surface of the target organization as ...

Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.