Kali Linux 2018: Securing Through Penetration Testing (Part 2)
Chapter 5: Scanning and Evasion Techniques This chapter describes the process of discovering devices on a target network using various tools in Kali Linux and other tools available on GitHub. We will cover the following topics: Description of the target discovery process Methods for identifying targ...
