After reading this chapter and completing the exercises, you will be able to do the following:
Perform passive reconnaissance
Perform active reconnaissance
Gather information from public sources
Use port scanners and vulnerability scanners
Once you are ready to begin the penetration test, one of the first ...