Information Gatheringa11y.text Information Gathering
Information Gathering with Metasploita11y.text Information Gathering with Metasploit
The foundation for any successful penetration test is solid reconnaissance. Failure to perform proper information gathering will have you flailing around at random, attacking machines that are not vulnerable and missing others that are.
We’ll be covering just a few of these information gathering techniques such as:
Let’s take a look at some of the built-in Metasploit features that help aid us in information gathering.