Introduction

What?

Gathering information about a target system that can be used to execute a successful attack. To get this information, use various methods with variant tools.

Why?

  • Analyse the security posture of the target and find loopholes for creating an attack plan.

  • Using different tools and techniques, narrow down the range of IP addresses.

  • Use the collected information to identify weaknesses in the target’s security.

  • Graphically represent the target’s network, so it can be used as a guide during the attack.

How?