The process of systematically gathering information about a target, such as usernames, network shares, services, and system configurations, to identify attack vectors.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free