I make a few assumptions about you:-
• You’re familiar with basic computer-, networking related concepts and terms.
• You have a basic understanding of what hackers and malicious users do.
• You have access to a computer and a network on which to use these techniques.
• You have access to the Internet to obtain the various tools used in the ethical hacking process.
• You have permission to perform the hacking techniques described in this book.