Introduction
This book is a personal notebook containing information I collected during my journey to become more familar with Penetration Teting.
The book follows a strucured approach that is based on the Certified Ethical Hacker (CEH) methodology with some smaller adjustments to have a clear seperation between the Active Reconnaissance, Passive Reconnaissance and Scanning & Enumeraton.
The chapter Phase 1 - Reconnaissance will only contain passive resonnaissance steps, with one exception: visiting a targets website.
Active Reconnaissace steps will be covered within the chapter Phase 2 - Scanning and Enumeration.