Chapter 2. Enumeration and Scanning
Solutions in this chapter:
Introduction
So, here we are again, two years later and covering some of the same ground. That’s not a bad thing, though, as this material is critical for any successful penetration test or vulnerability assessment. In this chapter, we will lead you through the initial objectives and requirements for performing enumeration and scanning in support of a penetration test or vulnerability assessment. After that, you will dig into some scenarios in which you will see how you can use these different tools and techniques to their full advantage.
Objectives
In a penetration test, there are implied boundaries. Depending ...
Get Penetration Tester's Open Source Toolkit, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.