Codelivly

Information Gathering & Reconnaissance

By Rocky Categories: Cybersecurity
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Ever wondered how ethical hackers find so much information without even touching a target system? That’s the power of recon!

In this beginner-friendly module, we’ll dive into the world of information gathering — the first and one of the most important steps in ethical hacking. You’ll learn how to uncover emails, subdomains, open ports, technologies, and even weak points — all using public data and free tools.

We’ll walk you through passive and active recon methods, show you how to use tools like Nmap, Shodan, Subfinder, and theHarvester, and even teach you how to write a clean recon report like the pros. No stress, no overly technical jargon — just hands-on learning, one step at a time.

If you’re planning to become a penetration tester, bug bounty hunter, or just want to level up your OSINT skills, this module is the perfect starting point.

Show More

What Will You Learn?

  • Understand the role of reconnaissance in ethical hacking and penetration testing
  • Distinguish between passive and active reconnaissance techniques
  • Use WHOIS, DNS, and OSINT tools to gather intelligence on a target
  • Perform email harvesting and employee profiling using public sources
  • Discover subdomains and exposed assets of an organization
  • Conduct network-level scanning using tools like Nmap, Shodan, and Censys
  • Automate recon tasks using popular open-source scripts and frameworks
  • Write a professional recon report to document your findings

Course Content

Overview

  • Introduction to Reconnaissance
  • Why Information Gathering is Crucial in Pentesting
  • Passive vs. Active Reconnaissance
  • Legal & Ethical Considerations

Passive Reconnaissance

Active Reconnaissance

Automated Recon Tools

Hands-On Labs

Tools Cheat Sheet & Resources