Section 2: Common Pentesting Tasks and Tools

In this section, we will learn how to gather, store, and process information. We'll also look at how to deploy payloads to a target and remove the fingerprints of a NetHunter attack.

The following chapters are in this section:

  • Chapter 3, Intelligence Gathering Tools
  • Chapter 4, Scanning and Enumeration Tools
  • Chapter 5, Gaining Access to a Victim
  • Chapter 6, Maintaining Control of a Victim
  • Chapter 7, Clearing Tracks and Removing Evidence from a Target