1 00:00:00,400 --> 00:00:09,370 Information gathering or enumeration or reconnaissance, whichever suits you best, depends upon what 2 00:00:09,370 --> 00:00:10,540 spy movies you've seen. 3 00:00:11,420 --> 00:00:18,020 In any event, they all define the same concept that this phase is the initial stage of penetration 4 00:00:18,020 --> 00:00:19,010 testing lifecycle. 5 00:00:19,810 --> 00:00:26,260 So reconnaissance should be one of the most critical aspects of a successful penetration test for you. 6 00:00:27,240 --> 00:00:33,180 This phase involves identification of various software and services running on the target. 7 00:00:34,010 --> 00:00:34,460 Now. 8 00:00:35,310 --> 00:00:42,810 I'm serious here, the first step for you to take while penetration testing is to figure out which particular 9 00:00:42,810 --> 00:00:49,800 version of the software is running on the target, that you will have a wealth of intelligence about 10 00:00:49,800 --> 00:00:55,160 your target by following comprehensive information gathering and enumeration. 11 00:00:55,860 --> 00:01:02,740 And that's how you decide specifically which attack is good for you to compromise the system. 12 00:01:03,480 --> 00:01:08,050 Now, you may be tempted to immediately launch an automated tool. 13 00:01:08,430 --> 00:01:14,370 However, I really do think that these attempts are less likely to help you to compromise the system. 14 00:01:15,090 --> 00:01:20,850 Failing in this phase might waste your time and also makes you go around attacking machines randomly. 15 00:01:21,700 --> 00:01:29,230 So this isn't something that's good and believe me, you don't want to do it, so the MSF has enumeration 16 00:01:29,230 --> 00:01:35,950 capabilities and it provides you with many auxiliary modules for performing information gathering. 17 00:01:36,790 --> 00:01:44,650 So in order to do that in this upcoming section, I will be exploring a variety of auxiliary modules 18 00:01:44,650 --> 00:01:45,760 within the MSA. 19 00:01:45,760 --> 00:01:47,190 So pay attention. 20 00:01:47,800 --> 00:01:54,790 And what I'm going to do is enumerate the services that use various protocols, such as TCP, UDP, 21 00:01:54,940 --> 00:02:03,490 FTP, SMB, SMTP, HTP, SFH and a bunch of others.