What this book covers
Chapter 1, Getting Started, explains the configuration of a security lab and then the installation and configuration of Kali Linux and other security tools.
Chapter 2, Reconnaissance, explains how to collect information on your target using passive information-gathering techniques. Collecting subdomains, e-mail addresses, and DNS enumeration are covered in depth.
Chapter 3, Discovery, explains gathering domain information on our target and identifying hosts on a given network segment.
Chapter 4, Port Scanning, covers multiple tools and methods for finding open ports on one or more hosts.
Chapter 5, Fingerprinting, explains identifying the services and versions associated with them once having identified open ports on ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access