Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Network and Service Enumeration with Shodan

Learn how adversaries gather intelligence during the Reconnaissance stage. This course will teach you to use Shodan and recon-ng to identify exposed services, misconfigurations, and potential entry points.

Beginner
19m

Created by Corey Thompson

Last Updated Nov 10, 2025

Course Thumbnail
  • Course

Network and Service Enumeration with Shodan

Learn how adversaries gather intelligence during the Reconnaissance stage. This course will teach you to use Shodan and recon-ng to identify exposed services, misconfigurations, and potential entry points.

Beginner
19m

Created by Corey Thompson

Last Updated Nov 10, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Cybersecurity professionals often lack structured methods to map an attacker’s view of exposed networks and services. In this course, Network and Service Enumeration with Shodan, you’ll learn to identify exposed services, host information, and potential entry points. First, you’ll explore passive network discovery using Shodan. Next, you’ll discover how to automate reconnaissance with recon-ng and the Shodan API. Finally, you’ll learn how to analyze host information and misconfigurations for triage and mitigation. When you’re finished with this course, you’ll have the skills and knowledge of MITRE ATT&CK reconnaissance techniques needed to identify exposed services, host information, and potential entry points.

Network and Service Enumeration with Shodan
Beginner
19m
Table of contents

About the author
Corey Thompson - Pluralsight course - Network and Service Enumeration with Shodan
Corey Thompson
3 courses 0.0 author rating 0 ratings

Corey is a cybersecurity expert with years of experience. He specializes in threat analysis and red teaming, helping organizations identify vulnerabilities through simulated attacks.

Get started with Pluralsight