Chapter 4
Taking a Challenge
Section 3
Planning the Attack
Once the scope is defined, we need to start gaining information about the target. In this video we will discuss about reconnaissance and scanning to be performed on the challenge environment to proceed further with the attack. - Perform detailed reconnaissance and scanning on target machine - Identify the services running and their version details - For each service version, find the possible exploits