This is a dedicated watch page for a single video.
Jimmy works as a professional Ethical Hacker with a large MNC. He is a CEH certified professional and was following the CEH methodology to perform the penetration testing. He is assigned a project for information gathering on a client’s network. He started penetration testing and was trying to find out the company’s internal URLs (mostly by trial and error), looking for any information about the different departments and business units. Jimmy was unable to find any information. What should Jimmy do to get the information he needs?