Video Transcription
00:04
All right, So now we're going to start a contest against our targets.
00:08
We're going to start with some information gathering. Well, Digger Cem,
00:12
open source reconnaissance so that we can do against any target we like. So your organization, your friends organization, your enemies organization, whatever you'd like, we're just going to do some open source
00:24
information gathering using various tools and techniques on. Then we'll switch and start using our virtual machine and actually start running. Some attacks will do some port scanning, will gather some data and maybe even come up with some ideas about what we might be able to exploit as we move forward.
Up Next
Advanced Penetration Testing
The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.
Instructed By
Similar Content