The first and most important phase of a red team engagement is reconnaissance. It is during this phase that you gather valuable information about your target, such as IP addresses, sub-domains, open ports and even potential vulnerabilities to be exploited.
In this course, Reconnaissance with Sn1per, we cover one of the most complete tools for recon, called Sn1per.
First, you will learn how to use this tool to perform active and passive scans against the Globomantics corporation. Then, you will learn how to use Sn1per to perform a stealth scan (using OSINT techniques) against a public domain.
This course covers several important tactics from the MITRE ATT&CK framework, including: Active Scanning (T1595), Gather Victim Host Information (T1592), Gather Victim Network Information (T1590), Search Open Technical Databases (T1596), Search Open Websites/Domains (T1593) and Gather Victim Identity Information (T1589).
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview (Tool Introduction) Hey there. Welcome to the course, Reconnaissance with Sn1per. In this Cybersecurity Tools course, you'll learn how to gather crucial information about your target using the Sn1per tool. The reconnaissance phase is one of the most important parts of a red team engagement. It is in this phase that we identify our targets and the potential vulnerabilities that we could exploit. In this course, we'll cover the Sn1per tool, which will automate a lot of the reconnaissance tasks so then you can save time while finding tons of valuable information about our target. We start this course by exploring how to use Sn1per to perform both active and passive scans against our Globomantics domain, and this will allow us to find IP addresses, open ports, and even vulnerabilities on the servers. Then, we also cover how to perform open source intelligence gathering with this tool so then we can find other interesting information, such as the email addresses of who works in the company. So, whether you're trying to gather information about a target in a red team engagement or you're just looking to audit the cybersecurity of your own company, join me in learning how to perform reconnaissance with the Sn1per tool, here at Pluralsight.