Description
Course info
Rating
(19)
Level
Intermediate
Updated
Sep 26, 2016
Duration
1h 21m
Description

A solid understanding of external footprinting techniques is critical to being an effective penetration tester. It can be the difference between breaking into an organization and having little to show for your efforts. This course, External Footprinting: Reconnaissance and Mapping, will challenge you by starting with a real world company and enumerating 10,000+ IPv4/IPv6 addresses and domain names used by the company. You will also get to utilize 15+ techniques for identifying targets, gathering host information, hunting weak web applications, and prioritizing your efforts. When you have finished with this course, you should have a solid understanding of external footprinting, passive/active reconnaissance, and the techniques discussed in the Penetration Testing Execution Standard (PTES). Software Required: Kali Linux.

About the author
About the author

Will is a Principal penetration tester at a small consulting firm. He enjoys Web Application Security and external attack vectors. Will has previously spoken at a number of security conferences including Blackhat, DEFCON, and TROOPERS.

More from the author
Writing Penetration Testing Reports
Intermediate
2h 0m
Aug 15, 2017
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone, my name is Will Vandevanter and welcome to my course External Footprinting: Reconnaissance and Mapping. I'm a penetration tester at Silent Robot Systems and I spend a lot of my time performing external penetration tests. External footprinting and reconnaissance are extremely important to the penetration testing process. This course will introduce you to a number of techniques to perform effective footprinting. Some of the major topics that we will cover include collecting host names and IP addresses, passive and active reconnaissance, hunting weak web applications, and mapping your hosts. When finished with this course you should have a solid understanding of external footprinting, passive and active reconnaissance, and the techniques discussed in the penetration testing execution standard or PTES. Before beginning the course you should be familiar with Kali Linux and have 1 to 2 years of experience penetration testing. I really hope you'll join me on this journey to learn external footprinting in the External Footprinting: Reconnaissance and Mapping course at Pluralsight.