Overview

Introduction

Welcome to the Conducting Active reconnaissance for Vulnerabilities in a Network Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 - Conducting Active Reconnaissance in a Network

After completing this lab, you will be able to:

  • Identify Live Hosts on a Network
  • Perform Discovery Scans
  • Perform Port Scanning
  • Perform Stealth Scans
  • Perform Packet Crafting
  • Perform Fingerprinting
  • Perform Service Probing
  • Disable Ping Sweep
  • Use Timing Templates
  • Work with Nmap Output Parameters, such as oA, oN, oG, and oX

Exam Objectives

  • PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
  • PT0-001: 4.1 Given a scenario, use Nmap to conduct information gathering exercises
  • PT0-001: 4.2 Compare and contrast various use cases of tools

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1- Conducting Active Reconnaissance in a Network

Penetration Testing, or Pentest, is a simulated cyber-attack to exploit the vulnerabilities in a network and the systems. It locates the vulnerabilities and then attempts to exploit them. A person conducting the pentest can attempt a breach of applications, protocols, Application Programming Interfaces (APIs), servers, firewalls, and anything that can be exploited on a network. The core intent is to discover the vulnerabilities before an attacker from the outside world can and then exploit them to simulate the amount of damage that can be caused.

In this exercise, you will learn about Penetration Testing and its importance.

Learning Outcomes

After completing this exercise, you will be able to:

  • Identify Live Hosts on a Network
  • Perform Discovery Scans
  • Perform Port Scanning
  • Perform Stealth Scans
  • Perform Packet Crafting
  • Perform Fingerprinting
  • Perform Service Probing
  • Disable Ping Sweep
  • Use Timing Templates
  • Work with Nmap Output Parameters, such as oA, oN, oG, and oX

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.