In this section, we will first explore open source intelligence (OSINT) concepts. We’ll then move on to networking. By the end of this section, you will be able to conduct sophisticated spoofing and footprinting techniques to understand the network and thus inform efforts to exploit targets.
This part of the book comprises the following chapters: