In this chapter, we will describe the process of discovering machines on the target network using various tools available in Kali Linux. We will be looking into the following topics:
To help you understand these concepts easily, we will use a virtual network as the target network.
After we have gathered information about our target network from third-party sources, such as search engines, the next step is to discover our target machines. The purpose of this process is as follows:
Collecting the previously mentioned information will help us during the vulnerabilities mapping process.
We can utilize the tools provided in Kali Linux for the target discovery process. Some of these tools are available in the Information Gathering menu. Others will have to be utilized from the command line. For each of these, the commands are provided.
In this chapter, we will only describe a few important tools in each category. The tools are selected based on the functionality, popularity, and the tool development activity.