Technical requirementsUnderstanding active reconnaissanceExploring Google hacking strategies Exploring DNS reconnaissancePerforming DNS enumerationChecking for DNS zone transfer misconfigurationAutomating OSINTEnumerating subdomainsWorking with DNSmapExploring Sublist3rProfiling websites using EyeWitnessExploring active scanning techniquesSpoofing MAC addressesDiscovering live systems on a networkProbing open service ports, services, and operating systemsWorking with evasion techniquesEnumerating common network servicesScanning using MetasploitEnumerating SMBEnumerating SSHPerforming user enumeration through noisy authentication controlsFinding data leaks in the cloudSummaryFurther reading