{"id":82625,"date":"2024-12-17T09:30:00","date_gmt":"2024-12-17T09:30:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82625"},"modified":"2024-12-24T07:14:39","modified_gmt":"2024-12-24T07:14:39","slug":"guide-to-penetration-testing-reconnaissance-tools-and-techniques","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/","title":{"rendered":"Guide to Penetration Testing: Reconnaissance Tools and Techniques\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82625\" class=\"elementor elementor-82625\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ed0275c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ed0275c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b47da6\" data-id=\"9b47da6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ff9125 elementor-widget elementor-widget-text-editor\" data-id=\"5ff9125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong> December 17, 2024<br>\n<strong>Time:<\/strong> 6:30 AM MST | 8:30 AM EST | 7:00 PM IST<\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Topic:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> Guide to Penetration Testing: Reconnaissance Tools and Techniques<\/span><\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>&nbsp;<\/strong><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> Penetration testing has emerged as a vital approach to proactively detect and mitigate security risks. With digital operations increasingly being utilized and storing data across different environments, the scope of assets requiring testing has also expanded. This evolution has also impacted the quantity and functionality of the tools and techniques used in penetration testing. This session, a part of our webinar series \u2018Guide to Penetration Testing,\u2019 aims to provide a comprehensive understanding of the reconnaissance phase of pen testing. The webinar will provide insights into the tools and techniques essential for effective surveillance across diverse digital environments, along with the best practices and guidelines to consider during reconnaissance. Attendees will learn about passive and active reconnaissance methods, including open-source intelligence (OSINT), network scanning, and enumeration. Additionally, they will learn how to gather valuable information from target systems without being detected as well as how to analyze this data to plan practical penetration tests.<\/span><\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding the importance of reconnaissance in penetration testing<\/li>\n<li>An overview of the most effective reconnaissance tools and techniques<\/li>\n<li>Step-by-step guidance on conducting passive and active reconnaissance<\/li>\n<li>Best practices for analyzing gathered data and planning subsequent testing phases<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/08\/Rodney-Gullatte-Jr.png\" alt=\"Rodney Gullatte, Jr.\" width=\"200\"><strong>Rodney Gullatte, Jr.<\/strong>, Certified Ethical Hacker and CEO of Firma IT Solutions<\/p>\n<p><strong>Bio:<\/strong> Rodney Gullatte, Jr. is a community leader and U.S. Air Force veteran. He has obtained several certifications, including certified ethical hacker, certified chief information security officer, and certified network defense architect, among 13 others. He is the CEO of Firma IT Solutions, which provides penetration testing facilities for private companies that have internal IT\/Cyber support in addition to those that outsource their IT\/Cyber services. With a background in information technology and cybersecurity that includes the Department of Defense, retail, healthcare, casinos, utility companies, and more, Rodney has developed Firma IT Solutions to make enterprise pen testing services available to businesses in the Pikes Peak Region and across the world. Colorado Springs, CO, is his 5th community as a military family. In a short span of nine years, Rodney has established himself in Colorado Springs as a transformational business and community leader. His latest accomplishments include becoming the first Black President of the Rotary Club of Colorado Springs (2020-2021); being awarded Colorado Springs Business Journal Best in Business 2017 and 2023 #1 Cybersecurity Company; receiving the Colorado Springs Business Journal Rising Stars Class of 2018 award; winning the 2020 Mayor\u2019s Young Leaders Award in Technology and Sustainability; winning the 2020 Front Range Power Connectors Networker of the Year; founding the Colorado Springs Black Business Network; and being awarded Small Business Week 2019 Veteran Business Owner of the Year. He previously served as the President &amp; CEO of the Colorado Springs Black Chamber of Commerce. Currently, he serves on the board of directors for the Colorado Springs Chamber and EDC, the Cultural Office of the Pikes Peak Region, and the National Cybersecurity Center. Additionally, he is an alumnus of the inaugural Colorado Springs Mayor\u2019s Civic Leaders Fellowship, Colorado Governor\u2019s Fellowship Class of 2022, and Colorado Springs Leadership Institute Class of 2019. He is currently an Honorary Commander of the U.S. Air Force Academy. Rodney is one of the 50 people globally to be honored as a 2023 EC-Council Chief Information Security Officer Hall of Fame award winner.<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/tF9ImrHHyx0?si=C9er_Ndr3b2z38Yr\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 17, 2024 Time: 6:30 AM MST | 8:30 AM EST | 7:00 PM IST Topic: Guide to Penetration Testing: Reconnaissance Tools and Techniques Watch Now &nbsp;Abstract: Penetration testing has emerged as a vital approach to proactively detect and mitigate security risks. With digital operations increasingly being utilized and storing data across different environments,&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82626,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82625","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Reconnaissance in Pen Testing: Tools and Techniques Explained<\/title>\n<meta name=\"description\" content=\"Discover the effective tools and techniques for penetration testing with guidance on reconnaissance, data analysis, and planning testing phases.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide to Penetration Testing: Reconnaissance Tools and Techniques\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover the effective tools and techniques for penetration testing with guidance on reconnaissance, data analysis, and planning testing phases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-17T09:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-24T07:14:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Guide to Penetration Testing: Reconnaissance Tools and Techniques\u00a0\",\"datePublished\":\"2024-12-17T09:30:00+00:00\",\"dateModified\":\"2024-12-24T07:14:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/\"},\"wordCount\":566,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/\",\"name\":\"Reconnaissance in Pen Testing: Tools and Techniques Explained\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x.png\",\"datePublished\":\"2024-12-17T09:30:00+00:00\",\"dateModified\":\"2024-12-24T07:14:39+00:00\",\"description\":\"Discover the effective tools and techniques for penetration testing with guidance on reconnaissance, data analysis, and planning testing phases.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x.png\",\"width\":931,\"height\":620,\"caption\":\"Penetration Testing Best Practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Guide to Penetration Testing: Reconnaissance Tools and Techniques\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Reconnaissance in Pen Testing: Tools and Techniques Explained","description":"Discover the effective tools and techniques for penetration testing with guidance on reconnaissance, data analysis, and planning testing phases.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/","og_locale":"en_US","og_type":"article","og_title":"Guide to Penetration Testing: Reconnaissance Tools and Techniques\u00a0","og_description":"Discover the effective tools and techniques for penetration testing with guidance on reconnaissance, data analysis, and planning testing phases.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-12-17T09:30:00+00:00","article_modified_time":"2024-12-24T07:14:39+00:00","og_image":[{"width":931,"height":620,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Guide to Penetration Testing: Reconnaissance Tools and Techniques\u00a0","datePublished":"2024-12-17T09:30:00+00:00","dateModified":"2024-12-24T07:14:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/"},"wordCount":566,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/","name":"Reconnaissance in Pen Testing: Tools and Techniques Explained","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x.png","datePublished":"2024-12-17T09:30:00+00:00","dateModified":"2024-12-24T07:14:39+00:00","description":"Discover the effective tools and techniques for penetration testing with guidance on reconnaissance, data analysis, and planning testing phases.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x.png","width":931,"height":620,"caption":"Penetration Testing Best Practices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-penetration-testing-reconnaissance-tools-and-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Guide to Penetration Testing: Reconnaissance Tools and Techniques\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82625"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82625\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82626"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}