Reconnaissance with Gobuster
Offered By: Pluralsight
Course Description
Overview
Performing reconnaissance is one of the most important phases in a red team exercise. In this course, you will learn active scanning and host enumeration using GoBuster.
During a red team exercise, finding all the potential targets is essential for the success of the engagement. The more hosts you enumerate, the higher your chances of finding relevant vulnerabilities to be exploited. In this course, Reconnaissance with Gobuster, you will learn how to utilize GoBuster to execute reconnaissance in a red team engagement. First, you will explore how to discover DNS subdomains via active scanning. Next, you will learn how to enumerate VHosts via brute forcing and dictionary attacks. Finally, you will gather all the potential targets for your red team engagement. When you’re finished with this course, you’ll have the skills and knowledge to execute the techniques “Active Scanning - Wordlist Scanning” (T1595.003) and “Active Scanning - Scanning IP Blocks” (T1595.001) using GoBuster. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
During a red team exercise, finding all the potential targets is essential for the success of the engagement. The more hosts you enumerate, the higher your chances of finding relevant vulnerabilities to be exploited. In this course, Reconnaissance with Gobuster, you will learn how to utilize GoBuster to execute reconnaissance in a red team engagement. First, you will explore how to discover DNS subdomains via active scanning. Next, you will learn how to enumerate VHosts via brute forcing and dictionary attacks. Finally, you will gather all the potential targets for your red team engagement. When you’re finished with this course, you’ll have the skills and knowledge to execute the techniques “Active Scanning - Wordlist Scanning” (T1595.003) and “Active Scanning - Scanning IP Blocks” (T1595.001) using GoBuster. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Syllabus
- Course Overview 1min
- Enumerating Hosts with GoBuster 11mins
- Resources 1min
Taught by
Ricardo Reimao
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX