: Are you testing for vulnerabilities, system misconfigurations, or specific password weaknesses? 2. Reconnaissance & Information Gathering
Before running any tools, define the boundaries of your test to stay within legal and professional limits. Basic Security Testing with Kali Linux
: Clearly list the IP addresses, domains, or network ranges included in the test. : Are you testing for vulnerabilities
: Use Nmap to identify active hosts, open ports, and running services. and running services.