Public Write-ups
  • 💻Lab Write-ups
    • Who is Space C4det
  • eJPT
    • eJPT Notes
      • Assessment Methodologies
        • Information Gathering
          • Introduction To Information Gathering
          • Passive and Active Information Gathering
        • Footprinting & Scanning
        • Enumeration
        • Vulnerability Assessment
  • Blue Team Labs Online
    • Remote Desktop Protocol (RDP)
    • 📝Phishy V1 BTLO
    • BITS (IN PROGRESS)
  • TCM Security Notes
    • TCM Security Notes
      • Viewing, Creating, and Editing Files
      • Users and Privileges
      • sudo and other commands
      • The OSI Model
      • Scripting with Bash
      • TCP, UDP, and the Three way Handshake
      • Common Network Commands
      • Installing and Updating Tools
      • IP Addresses
Powered by GitBook
On this page
  • Course Link
  • Course Instructor: Alexis Ahmed
  1. eJPT
  2. eJPT Notes
  3. Assessment Methodologies

Information Gathering

PreviousAssessment MethodologiesNextIntroduction To Information Gathering

Last updated 2 years ago

Information gathering is the first step of any penetration test and is arguably the most important as all other phases rely on the information obtained about the target during the information gathering phase. This course will introduce you to information gathering and will cover the process of performing both passive and active information gathering by leveraging various tools and techniques in order to obtain as much information as possible from a target.

Course Instructor:

Course Link
Alexis Ahmed
LinkedIn
YouTube
Twitter
GitHub

Introduction To Information Gathering

Passive and Active Information Gathering