You are conducting network discovery for a penetration test. Once you gain access, you want to gain an overall picture of the host, services, etc on the network. Which one command would you see if you can run on the network to gain that picture?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |