Conducting Active Reconnaissance for Vulnerabilities in a Network
Welcome to the Conducting Active reconnaissance for Vulnerabilities in a Network Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Introduction
Welcome to the Conducting Active reconnaissance for Vulnerabilities in a Network Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 - Conducting Active Reconnaissance in a Network
After completing this lab, you will be able to:
- Identify Live Hosts on a Network
- Perform Discovery Scans
- Perform Port Scanning
- Perform Stealth Scans
- Perform Packet Crafting
- Perform Fingerprinting
- Perform Service Probing
- Disable Ping Sweep
- Use Timing Templates
- Work with Nmap Output Parameters, such as oA, oN, oG, and oX
Exam Objectives
- PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
- PT0-001: 4.1 Given a scenario, use Nmap to conduct information gathering exercises
- PT0-001: 4.2 Compare and contrast various use cases of tools
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1- Conducting Active Reconnaissance in a Network
Penetration Testing, or Pentest, is a simulated cyber-attack to exploit the vulnerabilities in a network and the systems. It locates the vulnerabilities and then attempts to exploit them. A person conducting the pentest can attempt a breach of applications, protocols, Application Programming Interfaces (APIs), servers, firewalls, and anything that can be exploited on a network. The core intent is to discover the vulnerabilities before an attacker from the outside world can and then exploit them to simulate the amount of damage that can be caused.
In this exercise, you will learn about Penetration Testing and its importance.
Learning Outcomes
After completing this exercise, you will be able to:
- Identify Live Hosts on a Network
- Perform Discovery Scans
- Perform Port Scanning
- Perform Stealth Scans
- Perform Packet Crafting
- Perform Fingerprinting
- Perform Service Probing
- Disable Ping Sweep
- Use Timing Templates
- Work with Nmap Output Parameters, such as oA, oN, oG, and oX
See the full benefits of our immersive learning experience with interactive courses and guided career paths.