- Information Gathering
- Footprinting & Scanning
- Enumeration
- Vulnerability Assessment
- Auditing Fundamentals
- Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!
- Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!