Performing host discovery
When performing an internal penetration test for an organization, the company will allow you to connect your attacker machine to its network and may assign you a static IP address for your Kali Linux machine. On a network penetration testing engagement, the objective is to simulate real-world cyber-attacks on target systems that are within the rules of engagement, before starting the actual penetration test. The rules of engagement are simply the guidelines and constraints that are associated with performing the penetration test on an organization’s systems and network. They contain details such as the authorization given to the penetration tester for performing defined activities on the targeted systems and networks.
Ensure you do not perform any type of security testing on systems that are not within the scope, as you will face legal issues with the organization. However, once you’re within the scope, you’ll need to discover the...