Reconnaissance is the first and most important phase of any red team engagement. In this course, we will explore actively scanning websites and hosts using EyeWitness to gather information about targets and their organizations.
Conducting rapid reconnaissance is essential in making efficient use of time allotted for any red team engagement. How can we capture a visual representation of the client environment for faster target triage? In this course, Reconnaissance with EyeWitness, you’ll cover how to utilize Eyewitness to capture website and host screenshots in a red team environment. First, we’ll discuss EyeWitness’s installation methods and basic features. Next, we’ll demonstrate basic installation and basic syntax execution. Finally, we’ll explore advanced syntax and review the data by modeling the reconnaissance process on a real website. When you’re finished with this course, you’ll have the skills and knowledge to execute Active Scanning on websites and hosts to gather target information using EyeWitness. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Conducting rapid reconnaissance is essential in making efficient use of time allotted for any red team engagement. How can we capture a visual representation of the client environment for faster target triage? In this course, Reconnaissance with EyeWitness, you’ll cover how to utilize Eyewitness to capture website and host screenshots in a red team environment. First, we’ll discuss EyeWitness’s installation methods and basic features. Next, we’ll demonstrate basic installation and basic syntax execution. Finally, we’ll explore advanced syntax and review the data by modeling the reconnaissance process on a real website. When you’re finished with this course, you’ll have the skills and knowledge to execute Active Scanning on websites and hosts to gather target information using EyeWitness. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.