CHAPTER 2
Reconnaissance
In this chapter, you will learn how to
• Explain the importance of conducting reconnaissance
• Identify open source intelligence gathering techniques
• Use tools to automate methods for collecting information
• Describe methods and techniques for conducting metadata analysis
Before you start scanning a customer’s network or throwing exploits at it, you need to strategize your plan of attack. As a penetration tester, understanding your customer’s business model, the products, services, and technologies they utilize and/or develop, and the social media outlets they use for marketing and customer relations can go a long way in helping you to visualize the external attack surface of the target organization as ...
Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.