Performing reconnaissance is one of the most important phases in a red team exercise. In this course, you will learn active scanning and host enumeration using GoBuster.
During a red team exercise, finding all the potential targets is essential for the success of the engagement. The more hosts you enumerate, the higher your chances of finding relevant vulnerabilities to be exploited. In this course, Reconnaissance with Gobuster, you will learn how to utilize GoBuster to execute reconnaissance in a red team engagement. First, you will explore how to discover DNS subdomains via active scanning. Next, you will learn how to enumerate VHosts via brute forcing and dictionary attacks. Finally, you will gather all the potential targets for your red team engagement. When you’re finished with this course, you’ll have the skills and knowledge to execute the techniques “Active Scanning - Wordlist Scanning” (T1595.003) and “Active Scanning - Scanning IP Blocks” (T1595.001) using GoBuster. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
During a red team exercise, finding all the potential targets is essential for the success of the engagement. The more hosts you enumerate, the higher your chances of finding relevant vulnerabilities to be exploited. In this course, Reconnaissance with Gobuster, you will learn how to utilize GoBuster to execute reconnaissance in a red team engagement. First, you will explore how to discover DNS subdomains via active scanning. Next, you will learn how to enumerate VHosts via brute forcing and dictionary attacks. Finally, you will gather all the potential targets for your red team engagement. When you’re finished with this course, you’ll have the skills and knowledge to execute the techniques “Active Scanning - Wordlist Scanning” (T1595.003) and “Active Scanning - Scanning IP Blocks” (T1595.001) using GoBuster. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.