From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Understanding information gathering and vulnerability identification

Understanding information gathering and vulnerability identification

From the course: Certified Ethical Hacker (CEH)

Understanding information gathering and vulnerability identification

- As you may know, information gathering and reconnaissance is definitely the first step on any cyber attack. And as an ethical hacker, which you are trying to mimic what a true attacker will be doing, that will be your first step. There are two different ways that you can do information gathering. One is called passive reconnaissance, and that is actually looking for different types of public information. We call that OSINT or open-source intelligence. We're going to go into that in a few minutes. And then the second part is actually doing active reconnaissance. That's actually using tools like scanners, fuzzers, and other identification tools. So what you're seeing in front of your screen is the MITRE ATT&CK framework, which is a series of matrices that defines the tactics and techniques of an attacker. Let me make this a little bit be bigger. And the top, we reviewed this in previous lessons. You actually learn that this is basically the day in the life of an attack from…

Contents