IntroductionBefore exploiting vulnerabilities, attackers first scan systems to discover open ports and running services. This masterclass introduces Nmap, the industry’s #1 network scanner, and teaches you safe ways to gather information in your lab. Lesson 1 — Introduction to Recon Reconnaissance = gathering intel. Types: Passive (Google, WHOIS) vs Active (scanning). In this class, we...


