During the early parts of this book, we discussed in depth the importance of gathering information about a target using both passive and active techniques and tools in Kali Linux. However, when you've compromised a system via exploitation, it isn't the end of the penetration test. Rather, it's the point from which you will continue onward to exploit different systems on the organization's network, create multiple back doors, and gain the highest privileges on various victim devices.
In this section, we are going to perform network scanning using the following tools:
- Netdiscover
- AutoScan
- Zenmap
Let's look at each of these in more detail.