Back to all modules

Information Gathering and Vulnerability Scanning

Information Gathering and Vulnerability Scanning icon

Explore passive and active reconnaissance, and discover how to use Nmap to collect information about your targets efficiently.

This module explores the tools used for passive reconnaissance, i.e., collecting information without engaging with the target. Then it introduces various essential tools used in active reconnaissance. Finally, it explores Nmap usage in detail: discovering live hosts, conducting basic port scans, and conducting advanced port scans.

Information Gathering and Vulnerability Scanning icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more