We may earn an affiliate commission when you visit our partners.
Ricardo Reimao

The first and most important part of a red team engagement is reconnaissance. In this course, you will learn to gather technical information such as DNS subdomains and IP addresses, as well as people information, using theHarvester.

Read more

The first and most important part of a red team engagement is reconnaissance. In this course, you will learn to gather technical information such as DNS subdomains and IP addresses, as well as people information, using theHarvester.

The reconnaissance phase is one of the most important phases of a red team engagement. It is in this phase that you gather information about your target so you can select which machines to exploit and how to exploit them. In this course, Technical Information Gathering with theHarvester, you will cover one of the most important tools for information gathering, ttheHarvester. First, you will learn to gather DNS subdomains. Then, you will discover how to gather IP addresses from your target. Finally, you will explore how to automatically search for information regarding the people that work in your target company, including email addresses, Twitter accounts, and even LinkedIn profiles. By the end of this course, you will know four important tactics from the MITRE PRE-ATT&CK framework: Determine domain and IP Address Space (T1250), Conduct Active Scanning (T1254), Discover target logon/email address format (T1255) and Mine Social Media (T1273).

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Gathering Target Information with theHarvester
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills for technical information gathering, which is fundamental for red team engagements
Utilizes theHarvester, an industry-standard tool for information gathering
Provides a comprehensive overview of the reconnaissance phase in red team engagements
Taught by Ricardo Reimao, who is recognized for his expertise in reconnaissance and red team engagements
Requires prior knowledge of red team engagements, which may limit accessibility for beginners

Save this course

Save Technical Information Gathering with theHarvester to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Technical Information Gathering with theHarvester with these activities:
Read 'Red Team Field Manual' by Ben Clark
Gain insights into the field of red teaming and reconnaissance by reading a book written by an experienced professional.
Show steps
  • Purchase or borrow the book
  • Set aside dedicated time for reading
  • Take notes and highlight important concepts
Find a mentor or experienced professional in the field of information security
Connect with an experienced professional who can provide guidance and support for your learning journey.
Browse courses on Mentorship
Show steps
  • Attend industry events or online forums
  • Reach out to individuals in your network or through professional organizations
  • Prepare questions and be specific about what you hope to gain from the mentorship
Review subdomain reconnaissance concepts
Get up to speed with the concepts of subdomain reconnaissance, which will be covered in the course.
Browse courses on DNS Subdomains
Show steps
  • Review the course prerequisites for 'Tools and techniques for Reconnaissance'
  • Reread the introduction to 'Passive reconnaissance techniques'
Five other activities
Expand to see all activities and additional details
Show all eight activities
Watch tutorials on using theHarvester for reconnaissance
Supplement your learning by exploring tutorials that demonstrate the use of theHarvester.
Show steps
  • Search for tutorials on YouTube or other online platforms
  • Watch and take notes on the techniques demonstrated in the tutorials
  • Try out the techniques in your own practice environment
Practice using theHarvester
Get hands-on practice with theHarvester, the tool you will be using in the course.
Show steps
  • Set up a test environment for practice
  • Run theHarvester against a target domain
  • Analyze the results of the scan
Discuss subdomain reconnaissance techniques with peers
Engage in peer discussions to share and clarify your understanding of subdomain reconnaissance concepts.
Browse courses on DNS Subdomains
Show steps
  • Find a study group or online forum for the course
  • Participate in discussions and ask questions
  • Share your own insights and help others
Create a cheat sheet or reference guide for subdomain reconnaissance
Create a resource that will help you remember and apply the concepts of subdomain reconnaissance as you progress through the course.
Browse courses on DNS Subdomains
Show steps
  • Gather information from the course materials and other sources
  • Organize and summarize the information in a clear and concise way
  • Create or use a tool to generate the cheat sheet or reference guide
Conduct a reconnaissance project against a specific domain
Apply your knowledge and skills by conducting a reconnaissance project on a real-world target.
Browse courses on Red Team Engagement
Show steps
  • Choose a target domain for your project
  • Plan and execute your reconnaissance using theHarvester and other tools
  • Document your findings and write a report on your project

Career center

Learners who complete Technical Information Gathering with theHarvester will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst helps defend computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to identify vulnerabilities and develop strategies to protect against attacks.
Cybersecurity Risk Analyst
A Cybersecurity Risk Analyst identifies, analyzes, and manages risks to an organization's cybersecurity. One of the most important aspects of this job is being able to gather information about potential threats. This course, Technical Information Gathering with theHarvester, will teach you how to use theHarvester to gather information about potential threats, including DNS subdomains, IP addresses, and people information. This information can then be used to develop strategies to mitigate risks.
Penetration Tester
A Penetration Tester attempts to exploit vulnerabilities in a computer system or network to identify security weaknesses. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to identify vulnerabilities and develop strategies to exploit them.
Incident Responder
An Incident Responder investigates and responds to security incidents. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to investigate and respond to security incidents.
Security Engineer
A Security Engineer designs, implements, and maintains security measures to protect an organization's computer systems and networks. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to design and implement security measures.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains security measures to protect an organization's computer networks. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to design and implement security measures.
Forensic Investigator
A Forensic Investigator investigates computer crimes and gathers evidence to be used in court. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to investigate computer crimes and gather evidence.
Compliance Analyst
A Compliance Analyst ensures that an organization complies with relevant laws and regulations. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to ensure that an organization complies with relevant laws and regulations.
Ethical Hacker
An Ethical Hacker attempts to exploit vulnerabilities in a computer system or network to identify security weaknesses with the permission of the owner. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to identify security weaknesses.
Security Consultant
A Security Consultant advises organizations on how to improve their security posture. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to advise organizations on how to improve their security posture.
Threat Intelligence Analyst
A Threat Intelligence Analyst researches and analyzes threats to an organization's computer systems and networks. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to research and analyze threats.
Cloud Security Engineer
A Cloud Security Engineer designs, implements, and maintains security measures to protect an organization's cloud computing environment. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, is a good place to start. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to design and implement security measures.
Network Administrator
A Network Administrator designs, implements, and maintains computer networks. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, may be useful. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to design, implement, and maintain computer networks.
IT Security Manager
An IT Security Manager plans and directs the implementation and maintenance of an organization's security program. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, may be useful. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to plan and direct the implementation and maintenance of an organization's security program.
Cybersecurity Analyst
A Cybersecurity Analyst analyzes and interprets data to identify and mitigate cybersecurity threats. To be successful in this role, you need to have a strong foundation in information gathering techniques. This course, Technical Information Gathering with theHarvester, may be useful. It will teach you how to use theHarvester to gather information about your target, including DNS subdomains, IP addresses, and people information. This information can then be used to analyze and interpret data to identify and mitigate cybersecurity threats.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Technical Information Gathering with theHarvester.
Provides a practical guide to penetration testing, covering topics such as reconnaissance, vulnerability assessment, and exploitation. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of malware analysis, covering topics such as static analysis, dynamic analysis, and reversing. It valuable resource for anyone who wants to learn more about these topics.
Provides a fascinating look at the human element of security, and how attackers can use deception to gain access to systems and information. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of social engineering, covering topics such as reconnaissance, pretexting, and phishing. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of open source intelligence (OSINT), covering topics such as data collection, analysis, and reporting. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of gray hat hacking, covering topics such as reconnaissance, vulnerability assessment, and exploitation. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of hacking, covering topics such as reconnaissance, vulnerability assessment, and exploitation. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of Python programming for hackers and pentesters, covering topics such as scripting, automation, and exploitation. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of Metasploit, covering topics such as installation, configuration, and usage. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of web application hacking, covering topics such as reconnaissance, vulnerability assessment, and exploitation. It valuable resource for anyone who wants to learn more about these topics.
Provides a comprehensive overview of exploitation, covering topics such as vulnerability analysis, exploit development, and payload delivery. It valuable resource for anyone who wants to learn more about these topics.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Technical Information Gathering with theHarvester.
Reconnaissance with Sn1per
Most relevant
Reconnaissance with OWASP Amass
Most relevant
Reconnaissance with Shodan
Most relevant
Reconnaissance with Spiderfoot
Most relevant
Reconnaissance with Gobuster
Most relevant
Reconnaissance with EyeWitness
Most relevant
Information Gathering and Vulnerability Scanning for...
Most relevant
Ethical Hacking: Reconnaissance/Footprinting
Most relevant
Network Discovery and Enumeration with PowerShell
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser