This part is crucial as it lays the groundwork for understanding the target system, identifying its vulnerabilities, and determining potential exploitation paths.
Information gathering is the process of collecting as much data as possible about the target system or organization. This data helps the tester understand the target and identify potential entry points for an attack.
Passive information gathering involves collecting publicly available information without directly interacting with the target system.
Network Information:
Tools for Passive Information Gathering:
Active information gathering involves direct interaction with the target system to extract data.
Network Scanning:
Service Identification:
Vulnerability scanning involves systematically checking a system for known security weaknesses, such as outdated software, misconfigurations, or unpatched vulnerabilities.
Automated tools can quickly scan large systems and networks for vulnerabilities.
Automated tools often produce false positives or miss complex vulnerabilities. Manual confirmation ensures accurate results.
To understand and prioritize vulnerabilities, testers rely on databases that provide standardized information.
Enumeration is the process of gathering detailed information about services, devices, or users on the target system. This step goes deeper than scanning and focuses on discovering specific details.
Identify services running on the target system and their configurations.
Retrieve details about users and groups on the target system.
This knowledge area teaches you how to gather information passively and actively, scan for vulnerabilities, and enumerate specific details about a target system. These are foundational skills for penetration testers, and mastering them will set you up for success in the later stages of testing.
In vulnerability scanning, it’s important to distinguish between how deep the scan goes, and how much impact it might have. The PenTest+ exam often tests your ability to select the correct type of scan for a given scenario.
| Type | Description |
|---|---|
| Authenticated Scan | The scanner is provided with valid credentials (such as SSH, RDP, or SNMP login) to log in and scan the system as an insider. |
| Unauthenticated Scan | The scan is performed without any credentials, simulating an external attacker with no access. |
Authenticated scans reveal deeper vulnerabilities such as:
Missing patches.
Misconfigured permissions.
Weak password policies.
Unauthenticated scans are more limited, only exposing externally visible services and basic configurations.
Exam tip: If the client provides system credentials, assume the scan will be more thorough but also requires greater caution.
| Type | Description |
|---|---|
| Intrusive Scan | Actively attempts to exploit or simulate exploitation of vulnerabilities. |
| Non-Intrusive Scan | Passively identifies vulnerabilities without executing them. It detects weaknesses based on signatures or metadata. |
Intrusive scans may:
Cause service crashes or downtime.
Be flagged as attacks by intrusion detection systems (IDS).
Non-intrusive scans:
Are safer for production environments.
Only provide vulnerability detection—not validation.
Use Case: When testing in a live production system, prefer non-intrusive, unauthenticated scans.
Often referred to in vendor documentation as “credentialed scan.”
Performs scanning from the perspective of a legitimate user.
Offers high accuracy and visibility into:
Patch status.
Installed software.
User permissions.
Caution: Requires strong controls and logging, as misuse of credentials can cause compliance or operational risks.
The PT0-002 exam doesn’t just test tool names—it often presents scenarios where you must choose the best tool based on requirements (e.g., stealth, depth, type of service). That’s where tool comparison becomes essential.
| Feature | Nessus | OpenVAS |
|---|---|---|
| Licensing | Commercial (Tenable) | Open-source (Greenbone) |
| Vulnerability DB | Tenable’s proprietary feed | Community-maintained feeds |
| GUI & Usability | Intuitive, enterprise-ready | Less polished, but functional |
| Integration | Easily integrates with Tenable platforms | May require more configuration |
| Detection Accuracy | High (especially for zero-day coverage) | Good, but fewer plugin updates |
Nessus is best when commercial support, regular plugin updates, and high accuracy are needed.
OpenVAS is excellent for budget-conscious organizations or testing open-source ecosystems.
| Feature | Nmap | Netcat |
|---|---|---|
| Primary Use | Network scanning & enumeration | Manual port probing & communication |
| Scan Automation | Supports complex scan profiles | Manual (interactive or scripted) |
| Service Detection | Yes (version detection, OS fingerprinting) | Limited (banner grabbing only) |
| Output Detail | Structured, detailed output | Raw output, user-formatted |
Nmap is a full-featured scanner, ideal for mapping and discovering.
Netcat is a lightweight socket tool, ideal for quick checks or crafting custom TCP/UDP requests.
| Feature | Enum4linux | Medusa |
|---|---|---|
| Primary Function | SMB enumeration | Brute-force login attacks |
| Information Focus | Lists users, shares, groups (Samba/Windows) | Cracks credentials across protocols |
| Protocols Supported | SMB (via RPC), NetBIOS | SSH, FTP, RDP, SMB, etc. |
| Use Case | Reconnaissance & data gathering | Password attack & login testing |
Enum4linux is used during passive or active information gathering—before exploitation.
Medusa is used when attempting brute-force authentication, typically in the exploitation phase.
| Objective | Recommended Tool |
|---|---|
| Discover open ports | Nmap |
| Scan web apps for OWASP issues | OWASP ZAP |
| Intercept and tamper HTTP | Burp Suite |
| Run brute-force logins | Medusa |
| Enumerate Windows shares/users | Enum4linux |
| Analyze network traffic | Wireshark |
| Conduct credentialed vulnerability scan | Nessus / OpenVAS |
A penetration tester wants to gather information about a target organization without interacting directly with its systems. Which reconnaissance method should be used?
Passive reconnaissance.
Passive reconnaissance collects information about a target without sending traffic to the target’s systems. This technique relies on publicly available data sources such as WHOIS records, DNS records, social media profiles, public repositories, and search engines. Because no direct interaction occurs with the target network, passive reconnaissance reduces the likelihood of detection by security monitoring systems. It is typically the first step in a penetration test because it provides valuable information such as domain names, employee details, technology stacks, and potential attack surfaces. These insights can later guide active reconnaissance activities.
Demand Score: 83
Exam Relevance Score: 88
A tester wants to identify open ports and services on a target host. Which reconnaissance technique is most appropriate?
Active network scanning.
Active scanning involves directly interacting with the target system to identify open ports, running services, and potential vulnerabilities. Tools such as network scanners send packets to the target host and analyze the responses to determine which services are accessible. This technique provides accurate, real-time information about the target environment. However, because the target system receives the scanning traffic, the activity may be logged or detected by intrusion detection systems. Active scanning is typically performed after passive reconnaissance to verify discovered information and identify exploitable services.
Demand Score: 80
Exam Relevance Score: 90
What is the primary purpose of vulnerability scanning during a penetration test?
To automatically identify known vulnerabilities and misconfigurations in systems and applications.
Vulnerability scanners compare system configurations, software versions, and network services against databases of known vulnerabilities. These tools help testers quickly identify weaknesses such as outdated software, exposed services, weak encryption protocols, and configuration errors. While vulnerability scanners provide useful insights, they typically produce potential findings that require manual verification. Penetration testers must validate the results to determine whether a vulnerability is actually exploitable. Scanning therefore serves as an initial discovery phase that guides deeper exploitation attempts.
Demand Score: 77
Exam Relevance Score: 86
Why is service version detection important during reconnaissance?
It allows the tester to identify specific software versions that may contain known vulnerabilities.
Service version detection reveals the exact software version running on a network service such as a web server, database server, or SSH service. Knowing the version allows the tester to search vulnerability databases and exploit frameworks for known weaknesses affecting that software. For example, an outdated web server version might have documented remote code execution vulnerabilities. Version information therefore significantly improves the efficiency of vulnerability research and exploitation planning. Without accurate version data, the tester may need to rely on trial-and-error techniques.
Demand Score: 75
Exam Relevance Score: 84
What is the key difference between enumeration and vulnerability scanning?
Enumeration actively extracts detailed information from services, while vulnerability scanning identifies known weaknesses.
Enumeration focuses on retrieving detailed data from target services, such as user accounts, network shares, domain information, and service configurations. This process often requires interacting with specific protocols such as SMB, LDAP, or SNMP. Vulnerability scanning, in contrast, focuses on identifying potential security weaknesses using automated tools that compare systems against vulnerability databases. Enumeration provides deeper insight into the environment and helps testers discover valuable targets for exploitation, while vulnerability scanning highlights known weaknesses that may be exploitable.
Demand Score: 74
Exam Relevance Score: 85