Internal Recon & Enumeration
Last updated
Last updated
There are many factors of Host Reconnaissance & Enumeration, but mainly our objective is to build a picture and attack plan for a target organization. This could include probing hosts for software, security tools, and configurations. Along with reviewing internal documentation, internal websites, and internal configurations. We should also analyze the balance between useful information and avoiding detection.