![Kali Linux:An Ethical Hacker's Cookbook](https://wfqqreader-1252317822.image.myqcloud.com/cover/618/36700618/b_36700618.jpg)
上QQ阅读APP看书,第一时间看更新
Getting a list of subdomains
We don't always we have a situation where a client has defined a full detailed scope of what needs to be pentested. So we will use the following mentioned recipes to gather as much information as we can to perform a pentest.