Reconnaissance and Enumeration

Perform active and passive reconnaissance, gather information, and enumerate systems to uncover vulnerabilities (21% of exam).

Focuses on gathering information using open-source intelligence (OSINT), network sniffing, and protocol scanning. Covers enumeration techniques including DNS enumeration, service discovery, and directory enumeration. Includes using reconnaissance tools like Nmap, Wireshark, and Shodan for information gathering. Also covers modifying Python, PowerShell, and Bash scripts for reconnaissance and enumeration activities.
5 minutes 5 Questions

In the context of the CompTIA PenTest+ certification, Reconnaissance and Enumeration are the critical initial phases of a penetration test that determine the scope and success of subsequent attacks. Reconnaissance (often called footprinting) is the process of gathering broad information about a ta…

Concepts covered: Active reconnaissance techniques, Network scanning fundamentals, Port scanning and service detection, Protocol scanning, Banner grabbing, Network sniffing, Passive reconnaissance techniques, Open-source intelligence (OSINT), Social media intelligence, DNS reconnaissance, WHOIS and domain information, Search engine dorking, Shodan and Censys usage, DNS enumeration, Service enumeration, Directory enumeration, SMB enumeration, LDAP enumeration, SNMP enumeration, User and group enumeration, Email harvesting, Nmap scanning techniques, Wireshark packet analysis, Netcat usage, theHarvester tool, Recon-ng framework, Maltego for OSINT, Python scripting for recon, PowerShell scripting for enumeration, Bash scripting for automation, Script customization techniques

Test mode:
More Reconnaissance and Enumeration questions
948 questions (total)