As you’ll recall, the first phase in the four-phase network penetration testing (pentesting) methodology is the information-gathering phase. The goals and objectives for this phase are to gather as much information as possible about your target network environment. This phase is further broken up into three main components or sub-phases. Each sub-phase focuses on discovering information or intelligence about network targets within the following separate categories:
- Hosts --Sub-phase A: host discovery
- Services --Sub-phase B: service discovery
- Vulnerabilities --Sub-phase C: vulnerability discovery
Figure 2.1 illustrates the workflow from each sub-phase beginning with host discovery, then service discovery, and ending with vulnerability discovery. In this chapter, you’ll focus on the first sub-phase: host discovery. The purpose of this sub-phase is to discover as many possible network hosts (or targets) as possible within a given range of IP addresses (your scope). You want to produce two primary outputs during this component: