In module 3, we look at using the command line during penetration tests to perform reconnaissance, identify vulnerabilities, and establish remote access.