The first and most important part of a red team engagement is reconnaissance. In this course, you will learn to gather technical information such as DNS subdomains and IP addresses, as well as people information, using theHarvester.
The reconnaissance phase is one of the most important phases of a red team engagement. It is in this phase that you gather information about your target so you can select which machines to exploit and how to exploit them. In this course, Technical Information Gathering with theHarvester, you will cover one of the most important tools for information gathering, ttheHarvester. First, you will learn to gather DNS subdomains. Then, you will discover how to gather IP addresses from your target. Finally, you will explore how to automatically search for information regarding the people that work in your target company, including email addresses, Twitter accounts, and even LinkedIn profiles. By the end of this course, you will know four important tactics from the MITRE PRE-ATT&CK framework: Determine domain and IP Address Space (T1250), Conduct Active Scanning (T1254), Discover target logon/email address format (T1255) and Mine Social Media (T1273).
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview Hey there! Welcome to our course, Technical Information Gathering With theHarvester. In the Cybersecurity Tools course, you learned how to gather both technical and people information about your target using theHarvester tool. In a red team engagement, one of the most important steps of the whole project is gathering information about your client, and that's because the information that you collect in here will be really useful during the exploitation phase of your engagement. For example, if you do a really good information gathering job, you may find not‑so‑secure servers open to the internet, which can be way easier to exploit than the main company website. So in this course, we'll cover theHarvester, which will help you to automate the information gathering so you can find tons of interesting information about your target. We start by showing how to use theHarvester to find subdomains, and IP addresses that could be interesting for an exploitation phase. Then we also cover how to use the tool to find information about the people that work in the company, such as email addresses, Twitter accounts, and even LinkedIn profiles. So whether you're trying to gather information about a target in a red team engagement or you're just looking to audit the cybersecurity exposure of your own company, join me in learning how to gather technical information with theHarvester tool here, at Pluralsight.