Description
Course info
Level
Intermediate
Updated
May 11, 2017
Duration
50m 2s
Description

At the core of the penetration testing process is a thorough knowledge of open source intelligence (OSINT) gathering. In this course, Penetration Testing OSINT Gathering with Recon-ng, you'll learn how to use the free Recon-ng framework to find possible infrastructure vulnerabilities. First, you'll explore how the more than ninety scan modules included in Recon-ng are organized and prepared for use. Next, you'll dive into specifics of how to plan and run scans. Finally, you'll cover how to interpret and report the data that you get back. When you're finished with this course, you'll be able to leverage Recon-ng's many powerful tools to shine a bright light on the true state of your company's security.

About the author
About the author

David taught high school for twenty years, worked as a Linux system administrator for five years, and has been writing since he could hold a crayon between his fingers. His childhood bedroom wall has since been repainted.

More from the author
Continuous Monitoring: The Big Picture
Beginner
45m 34s
6 Jun 2017
Using Docker with AWS Elastic Beanstalk
Beginner
57m 46s
6 Apr 2017
Managing Docker Images
Beginner
1h 6m
23 Feb 2017
More courses by David Clinton
Transcript
Transcript

Do you want to learn how to penetration test networked and public-facing infrastructure like a pro? Well, before you can actually launch a white-hat pen test attack to uncover your target's vulnerabilities, you'll first need to prepare by gathering as much OSINT - open source intelligence - as you can possibly get. By using freely available search and scanning tools, it's possible to unearth amazing levels of detail on a company's technology stacks, networks, IT protocols, managers, employees, and web site. But manually looking for all those details can take forever...and the odds are that you'll end up missing important stuff.

The open source intelligence gathering framework, Recon-ng, can quite literally do it all for you.

You provide some basic seed data, point the tool to the domain you're after and, pretty much instantly, it will return more data than you'll know what to do with.

And then it will organize the data into one of a number of consumable formats. Why waste time doing this by hand when Recon-ng is ready to serve.

In this course, we'll learn how to identify which of the many dozens of Recon-ng's scan modules you need, how to properly prepare them for effective deployment, and then how to interpret and report on everything that you find.