Monthly Archives: January 2023

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 4

43. Packet Crafting (OBJ 2.2) As a penetration tester, you’ll often find that there are times where you need to manipulate the way TCP/IP works in a given network. When we do this manipulation we call it packet crafting. Packet crafting is a technique that allows someone to generate a network packet with a specific… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 3

41. Website Reconnaissance (OBJ 2.3) There are a lot of websites available online and many organizations are seriously invested in their websites to reach new customers or to sell their products to their existing customers. For this reason, you’re often going to find yourself conducting a lot of penetration tests and engagements that involve website… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 2

39. Conducting Enumeration (OBJ 2.3) In this video, I’m going to demonstrate how to use Zenmap to conduct scanning and enumeration. For this example, I am connected directly to the local area network of my victim machines. So now Zenmap pops up and we can start doing our scans. The first scan we want to… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 1

37. Active Reconnaissance (OBJ 2.2 and 2.3) In this section of the course, we’re going to discuss Active Reconnaissance. Now, as we continue to move forward with information gathering and vulnerability scanning, we’re going to find that we’re going to move from being passive to active in our information gathering. Active reconnaissance is a type… Read More »

CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 6

34. URL Analysis (OBJ 2.1) URL analysis. Now, at this point in your career, you should know what a URL is. A URL is a uniform resource locator. It’s that little address that you type and the top of your web browser to get to diontraining.com or comtia.org or whatever other website you want to… Read More »

CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 5

32. Public Repositories (OBJ 2.1) As you’ve seen by now, data is everywhere online if you just know where to look at it now. Now, some other great places to look when you’re doing your reconnaissance is public source code repositories as well as website archives. Now public source code repositories are websites that allow… Read More »

CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 4

30. DNS Information (OBJ 2.1) There is a lot of information you can gather from the domain name system. Now, we’re going to talk about each of the different record types that we have inside of DNS and the purpose of DNS, but we’re not going to do a really deep, deep dive here because… Read More »

CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 3

28. OSINT Tools (OBJ 2.1) Open-source intelligence tools are used during the reconnaissance phase to find actionable intelligence from various publicly available sources. This intelligence can help the penetration tester to be more precise and targeted in their attack development and future exploits during their engagement. because OSINT is publicly available. You’re not going to… Read More »

CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 2

26. Open-Source Intelligence (OSINT) (OBJ 2.1) There is a lot of great information available online for free that can help you understand how a business or organization is operating. This information is just sitting out there waiting for you to find it. This information is considered open source in the world of information and intelligence… Read More »

CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 1

24. Passive Reconnaissance (OBJ 2.1) In this section of the course, we’re going to discuss Passive Reconnaissance. As we move from our planning and scoping phase of our penetration test, we find ourselves in the second stage of the engagement, Information Gathering and Vulnerability Scanning. During this stage, we’re going to be focused on conducting… Read More »

img