- Information Gathering
- Footprinting & Scanning
- Enumeration
- Vulnerability Assessment
- Auditing Fundamentals
Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!
❗_Never run these techniques on un-authorized addresses_