bars
🥷
Red
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
â•
Attacker Lifecycle
chevron-right
Steps
chevron-right
🔬
Information Gathering
Infrastructure Enumeration
use dns
find firewalls
Previous
OSINT
chevron-left
Next
Host Enumeration
chevron-right
Last updated
7 hours ago