Reconnaissance is the process of discovering information about the target before you engage. Passive Reconnaissance is doing this in a matter that leaves no trace, which helps to keep your identity under the hacker hoodie you're wearing.
Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers tons of questions that save them time while becoming active. It only makes sense that you as a security professional do the same. In this course, Conducting Passive Reconnaissance for CompTIA PenTest+, you will learn about effective untraceable information gathering, referred to as reconnaissance. First, you will see what information can be discovered about your target using public and open source information. Next, you will discover what WHOIS, nslookup, and even Google can expose about your target. Finally, you will explore some applications that are designed to help automate this phase of reconnaissance. When you’re finished with this course, you will have the skills and knowledge of passive reconnaissance needed to conduct a penetration test.
Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.
Course Overview Hey everyone. My name is Dale Meredith, and I want to welcome you to my course, Conducting Passive Reconnaissance for CompTIA's PenTest+. Now you may be saying who's Dale Meredith? Well, I'm a tech guy. I've got a lot of certs behind me, Microsoft, EC-Council, CompTIA. I'm a Microsoft and cyber security trainer and consultant for my own company, My Mentored Learning, and I maintain my own security YouTube Channel called Dale Dumbs IT down. Now this particular course is a part of a series for the CompTIA PenTest+ certification program. But don't worry, I'm going to cover other information that's more real world here for you, so you get more bang for your buck. And this course is actually one of my favorites because it's about reconnaissance, and doing it passively, meaning I'm not going to get caught. And if you're not familiar with reconnaissance, you need to be because attackers spend 70 to 80% of their time gathering information about their target. This actually makes it a lot easier for them to infiltrate your network, and that's what I'm going to show you, what are the steps that they go through. We're going to first go through and learn about things like whois and using a standard nslookup. We'll even do some Google hacking. Then we'll go through and take a look at some cool tools, dude, that's going to help us automate the whole process of gathering this information, this open-source information about our target. By the end of this course, you will have all the skills and knowledge to perform your own passive reconnaissance on your own target, maybe it's your own company, but don't do that without permission. Now before you start this course, you should be somewhat familiar with basic network topologies and technologies. You should be familiar with operating systems like Windows, as well as Kali Linux, and you need to make sure that you go back and watch its requirements, for you too have seen the Laying the Foundation for Penetration Testing for CompTIA PenTest+. Now after you watch this course, you should feel comfortable in diving into other courses within this series, including how to do active reconnaissance, as well as even hacking the system, I would even go back and look at some of our ethical hacking courses as well. You can never have enough knowledge. So, I hope you'll join me on this journey learning how to think and do things like an attacker without getting caught because you're Conducting your Passive Reconnaissance for CompTIA PenTest+, here at Pluralsight.