Introduction
What?
Notes on tools used to detect and exploit security misconfiguration, network vulnerabilities, and threats like open ports, vulnerable devices, or outdated software running on the network.
Why?
[imulating hacker-style attacks on network assets.