Let your plans be dark and impenetrable as night, and when you move, fall like a thunderbolt.
Sun Tzu, The Art of War
In Part III, we look at using the command line during penetration tests to perform reconnaissance, identify vulnerabilities, and establish remote access.