- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
Active Reconnaissance: Host Discovery, Port Scanning, and OS Detection Explained
Active reconnaissance is where real pentests begin, and Nmap is the tool
that's been in every professional pentester's kit for decades. In this
lecture, I walk through the four core Nmap commands you'll actually use
on live engagements: host discovery, TCP SYN scanning, service version
detection, and OS fingerprinting.
I'm Thomas Wilhelm. 30 years in offensive security, former practice
director, Army cryptanalyst, and author of "Professional Penetration
Testing" and "Basics of Hacking and Penetration Testing." On this
channel, I teach the methodology, scoping, and execution side of
pentesting that most tutorials skip.
WHAT YOU'LL LEARN
- What active reconnaissance is and how it differs from passive recon
- How to run a ping sweep to identify live hosts (nmap -sn)
- How to enumerate service versions for vulnerability research (nmap -sV)
- How to fingerprint the target operating system (nmap -O)
- How each scan type fits into a real pentest methodology
GO DEEPER
Both of my pentesting books cover reconnaissance, scoping, and
methodology in detail. Links and chapter references on https://Pentest.TV.
SUBSCRIBE for weekly pentesting tutorials, methodology breakdowns,
and war stories from three decades in the field. Channel members get
access to bonus deep-dive videos.
JOIN this channel to get access to perks:
https://www.youtube.com/@pentest_TV/join
#Nmap #PenetrationTesting #EthicalHacking #CyberSecurity #ActiveRecon
#PortScanning #InfoSec #PentestTutorial #NetworkSecurity #OSINT
#KaliLinux #RedTeam #HackingTutorial #CyberSecurityTraining #pentesting
Видео Active Reconnaissance: Host Discovery, Port Scanning, and OS Detection Explained канала pentestTV
that's been in every professional pentester's kit for decades. In this
lecture, I walk through the four core Nmap commands you'll actually use
on live engagements: host discovery, TCP SYN scanning, service version
detection, and OS fingerprinting.
I'm Thomas Wilhelm. 30 years in offensive security, former practice
director, Army cryptanalyst, and author of "Professional Penetration
Testing" and "Basics of Hacking and Penetration Testing." On this
channel, I teach the methodology, scoping, and execution side of
pentesting that most tutorials skip.
WHAT YOU'LL LEARN
- What active reconnaissance is and how it differs from passive recon
- How to run a ping sweep to identify live hosts (nmap -sn)
- How to enumerate service versions for vulnerability research (nmap -sV)
- How to fingerprint the target operating system (nmap -O)
- How each scan type fits into a real pentest methodology
GO DEEPER
Both of my pentesting books cover reconnaissance, scoping, and
methodology in detail. Links and chapter references on https://Pentest.TV.
SUBSCRIBE for weekly pentesting tutorials, methodology breakdowns,
and war stories from three decades in the field. Channel members get
access to bonus deep-dive videos.
JOIN this channel to get access to perks:
https://www.youtube.com/@pentest_TV/join
#Nmap #PenetrationTesting #EthicalHacking #CyberSecurity #ActiveRecon
#PortScanning #InfoSec #PentestTutorial #NetworkSecurity #OSINT
#KaliLinux #RedTeam #HackingTutorial #CyberSecurityTraining #pentesting
Видео Active Reconnaissance: Host Discovery, Port Scanning, and OS Detection Explained канала pentestTV
Комментарии отсутствуют
Информация о видео
15 мая 2026 г. 16:53:41
00:08:51
Другие видео канала




















