Blog Posts
Introduction to the Network Scanning Phase
The second most important phase is the scanning phase which allows the hacker to interact with the target by utilising tools like nmap and hping.
Introduction to the Reconnaissance Phase
The first phase for any hacker is information gathering and reconnaissance. This post explains some of the key concepts and some tools.