Chapter 5. Target Discovery

In this chapter, we will describe the process of discovering machines on the target network using various tools available in Kali Linux. We will explain the following topics:

  • A description of the target discovery process
  • The method used to identify target machines using the tools in Kali Linux
  • The steps required to find the operating systems of the target machines (operating system fingerprinting)

To help you understand these concepts easily, we will use a virtual network as the target network.

Starting off with target discovery

After we have gathered information about our target network from third-party sources, such as search engines, the next step would be to discover our target machines. The purpose of this process is ...

Get Kali Linux – Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.