We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Reconnaissance with EyeWitness

Kirk Carter

Reconnaissance is the first and most important phase of any red team engagement. In this course, we will explore actively scanning websites and hosts using EyeWitness to gather information about targets and their organizations.

Read more

Reconnaissance is the first and most important phase of any red team engagement. In this course, we will explore actively scanning websites and hosts using EyeWitness to gather information about targets and their organizations.

Conducting rapid reconnaissance is essential in making efficient use of time allotted for any red team engagement. How can we capture a visual representation of the client environment for faster target triage? In this course, Reconnaissance with EyeWitness, you’ll cover how to utilize Eyewitness to capture website and host screenshots in a red team environment. First, we’ll discuss EyeWitness’s installation methods and basic features. Next, we’ll demonstrate basic installation and basic syntax execution. Finally, we’ll explore advanced syntax and review the data by modeling the reconnaissance process on a real website. When you’re finished with this course, you’ll have the skills and knowledge to execute Active Scanning on websites and hosts to gather target information using EyeWitness. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Enroll now

What's inside

Syllabus

Course Overview
Scanning Targets with EyeWitness
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops visual representations of websites and hosts, which is standard in red team environments
Introduces EyeWitness, a tool commonly used for website and host scanning
Hands-on practice of executing reconnaissance techniques, providing a practical learning experience
Focus on reconnaissance in the context of red team engagements, catering to specialized learners in cybersecurity
May require prior knowledge of red teaming or reconnaissance techniques
Taught by Kirk Carter, who is acknowledged in the cybersecurity community

Save this course

Save Reconnaissance with EyeWitness to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Reconnaissance with EyeWitness. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Reconnaissance with EyeWitness will develop knowledge and skills that may be useful to these careers:
Software Engineer
A Software Engineer is responsible for designing, developing, and maintaining software applications. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Software Engineers develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Software Engineers with a valuable overview of EyeWitness and how to use it in a real-world setting.
Database Administrator
A Database Administrator is responsible for managing and maintaining an organization's databases. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Database Administrators develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Database Administrators with a valuable overview of EyeWitness and how to use it in a real-world setting.
IT Auditor
An IT Auditor is responsible for assessing an organization's IT systems and controls to ensure compliance with laws and regulations. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help IT Auditors develop the skills necessary to execute Active Scanning on websites and hosts to gather target information. This course may provide IT Auditors with a valuable overview of EyeWitness and how to use it in a real-world setting.
Information Security Analyst
An Information Security Analyst is responsible for planning and implementing security measures to protect an organization's computer systems and networks. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Information Security Analysts develop the skills necessary to execute Active Scanning on websites and hosts to gather target information. This course may help Information Security Analysts build a foundation for success by providing them with a detailed overview of EyeWitness and how to use it in a real-world setting.
Cloud Engineer
A Cloud Engineer is responsible for designing, implementing, and maintaining an organization's cloud computing systems. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Cloud Engineers develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Cloud Engineers with a valuable overview of EyeWitness and how to use it in a real-world setting.
Security Engineer
A Security Engineer is responsible for designing, implementing, and maintaining an organization's security systems. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Security Engineers develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Security Engineers with a valuable overview of EyeWitness and how to use it in a real-world setting.
Network Engineer
A Network Engineer is responsible for designing, implementing, and maintaining an organization's computer networks. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Network Engineers develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Network Engineers with a valuable overview of EyeWitness and how to use it in a real-world setting.
Security Analyst
A Security Analyst is responsible for monitoring and analyzing an organization's security systems to identify and mitigate threats. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Security Analysts develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Security Analysts with a valuable overview of EyeWitness and how to use it in a real-world setting.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for identifying, analyzing, and responding to cybersecurity threats. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Cybersecurity Analysts develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Cybersecurity Analysts with a valuable overview of EyeWitness and how to use it in a real-world setting.
Incident Responder
An Incident Responder is responsible for responding to and resolving security incidents. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Incident Responders develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Incident Responders with a valuable overview of EyeWitness and how to use it in a real-world setting.
Systems Engineer
A Systems Engineer is responsible for designing, implementing, and maintaining an organization's computer systems. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Systems Engineers develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Systems Engineers with a valuable overview of EyeWitness and how to use it in a real-world setting.
System Administrator
A System Administrator is responsible for managing and maintaining an organization's computer systems and networks. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help System Administrators develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide System Administrators with a valuable overview of EyeWitness and how to use it in a real-world setting.
Computer Network Architect
A Computer Network Architect is responsible for designing, implementing, and maintaining an organization's computer networks. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Computer Network Architects develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Computer Network Architects with a valuable overview of EyeWitness and how to use it in a real-world setting.
Security Architect
A Security Architect is responsible for designing and implementing an organization's security systems. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help Security Architects develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide Security Architects with a valuable overview of EyeWitness and how to use it in a real-world setting.
IT Specialist
An IT Specialist is responsible for providing technical support to an organization's users. They would need to know how to perform reconnaissance on websites and hosts to gather information about targets and their organizations. Reconnaissance with EyeWitness can help IT Specialists develop the skills to execute Active Scanning on websites and hosts to gather target information. This course may provide IT Specialists with a valuable overview of EyeWitness and how to use it in a real-world setting.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Reconnaissance with EyeWitness.
This foundational book for penetration testers includes reconnaissance as a critical phase of ethical hacking.
This practical guide covers reconnaissance as a key step in network security assessment and risk management.
This real-world guide for penetration testers explores reconnaissance and information gathering techniques.
Includes guidance on using Python for reconnaissance and information gathering, which are essential skills for ethical hackers.
This beginner-friendly book includes a section on reconnaissance techniques for web application security testing.
Provides a gentle introduction to reconnaissance and penetration testing, which are foundational skills for offensive security practitioners.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Reconnaissance with EyeWitness.
Reconnaissance with Gobuster
Most relevant
Network Discovery and Enumeration with PowerShell
Most relevant
Technical Information Gathering with theHarvester
Most relevant
Reconnaissance with Sn1per
Most relevant
Reconnaissance with OWASP Amass
Most relevant
Information Gathering and Vulnerability Scanning for...
Most relevant
Reconnaissance with Spiderfoot
Most relevant
Reconnaissance with Shodan
Most relevant
Collection with PowerSploit
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser