Back to all modules

Information Gathering and Vulnerability Scanning

Explore passive and active reconnaissance, and discover how to use Nmap to collect information about your targets efficiently.

This module explores the tools used for passive reconnaissance, i.e., collecting information without engaging with the target. Then it introduces various essential tools used in active reconnaissance. Finally, it explores Nmap usage in detail: discovering live hosts, conducting basic port scans, and conducting advanced port scans.

Loading...

Loading rooms...

Need to know
Next Steps

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Learning Structure Diagram