![Hands-On Penetration Testing with Kali NetHunter](https://wfqqreader-1252317822.image.myqcloud.com/cover/840/36698840/b_36698840.jpg)
上QQ阅读APP看书,第一时间看更新
Section 2: Common Pentesting Tasks and Tools
In this section, we will learn how to gather, store, and process information. We'll also look at how to deploy payloads to a target and remove the fingerprints of a NetHunter attack.
The following chapters are in this section: