In the last chapter, you learned that the information-gathering phase is broken into three separate sub-phases:
You should be finished with the first sub-phase already. If you haven’t done host discovery against your target environment yet, go back and complete chapter 2 before continuing. In this chapter, you learn how to execute the second sub-phase: service discovery. During service discovery, your goal is to identify any available network services listening on the hosts you discovered during sub-phase A that might potentially be vulnerable to an attack.