Introduction

What?

Notes on tools used to detect and exploit security misconfiguration, network vulnerabilities, and threats like open ports, vulnerable devices, or outdated software running on the network.

Why?

[imulating hacker-style attacks on network assets.

How?