Information Gathering Intro (part 1)
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
14 hours 26 minutes
All right, So now we're going to start a contest against our targets.
We're going to start with some information gathering. Well, Digger Cem,
open source reconnaissance so that we can do against any target we like. So your organization, your friends organization, your enemies organization, whatever you'd like, we're just going to do some open source
information gathering using various tools and techniques on. Then we'll switch and start using our virtual machine and actually start running. Some attacks will do some port scanning, will gather some data and maybe even come up with some ideas about what we might be able to exploit as we move forward.