External Network Attacks
Welcome to External Network Attacks —a hands-on, methodology-driven course that teaches you how to approach a penetration test from the outside-in, just as real-world adversaries do.
If you are here, you understand that every security engagement begins at the perimeter. Before there is a foothold, before there is lateral movement, before there is domain dominance—there is the external network. It is the front door. And in many organizations, that front door is not as secure as they believe.
This course is about mastering the external penetration testing methodology. From the moment you receive a target scope to the moment you establish your first foothold, you will learn the tools, techniques, and mindset required to systematically identify and exploit vulnerabilities in internet-facing infrastructure.
The External Penetration Testing Mindset
External penetration testing simulates what an attacker sees: a target organization with no prior access, no internal credentials, and no insider knowledge. You start with nothing but a domain name or IP range and build your understanding from the ground up.
This requires a fundamentally different approach than internal testing:
| Internal Testing | External Testing |
|---|---|
| Assumes network access | Starts from the internet |
| Credentials often available | No credentials initially |
| Lateral movement focus | Perimeter breach focus |
| Active Directory centric | Infrastructure centric |
| Known environment | Unknown environment |
Your goal is not simply to “find vulnerabilities”—it is to simulate a real attack from an external perspective, documenting what an adversary could achieve and how the organization can defend against it.
The External Attack Lifecycle
Every external penetration test follows a structured methodology. You will learn each phase in depth:
OSINT & Reconnaissance → Network Scanning → Vulnerability Assessment → Exploitation → Pivoting → Reporting
| Phase | What You Will Learn |
|---|---|
| OSINT & Reconnaissance | Gathering intelligence from public sources—DNS records, subdomains, email addresses, leaked credentials, technology stacks—without ever touching the target network |
| Network Scanning | Discovering live hosts, open ports, and running services across the external attack surface using modern scanning techniques |
| Vulnerability Assessment | Identifying known vulnerabilities in discovered services, prioritizing targets based on exploitability and impact |
| Exploitation (Metasploit) | Leveraging the industry-standard exploitation framework to gain initial access quickly and reliably |
| Manual Exploitation | Moving beyond automated tools to exploit complex vulnerabilities, craft custom payloads, and bypass security controls |
| Pivoting | Transforming a single compromised host into a beachhead for accessing internal networks, bypassing firewalls, and expanding the attack surface |
What You Will Learn
Module 1: OSINT — Open Source Intelligence
Before you scan a single IP address, you will learn to gather intelligence from the open internet. Using tools like theHarvester, Shodan, Censys, Amass, and DNS recon tools, you will:
-
Discover subdomains and uncover forgotten infrastructure
-
Identify employee email addresses for phishing simulations
-
Find exposed credentials in public data breaches
-
Map technology stacks without sending a single packet
OSINT is the art of knowing your target before they know you. It often reveals the easiest path inside.
Module 2: Network Reconnaissance & Port Scanning
With your intelligence gathered, you will learn to map the external attack surface. Using Nmap, masscan, and Zmap, you will:
-
Discover live hosts across IP ranges
-
Perform stealth scanning to avoid detection
-
Identify open ports, running services, and operating systems
-
Enumerate service banners and version information
You will learn not just the commands, but the art of scanning—balancing speed against stealth, depth against detection, and coverage against noise.
Module 3: Vulnerability Scanning
Armed with service information, you will learn to identify known vulnerabilities. Using Nessus, OpenVAS, and Nmap NSE scripts, you will:
-
Automate vulnerability discovery across hundreds of hosts
-
Validate findings to eliminate false positives
-
Prioritize vulnerabilities by severity and exploitability
-
Correlate findings with OSINT data for targeted exploitation
Vulnerability scanning is not about running a tool and printing a report. You will learn to interpret results, identify misconfigurations, and distinguish real risk from noise.
Module 4: Exploitation with Metasploit
Metasploit is the industry standard for exploitation—and you will master it. You will learn:
-
Navigating the Metasploit framework and its module structure
-
Matching vulnerabilities to exploits
-
Configuring payloads (reverse shells, Meterpreter, bind shells)
-
Post-exploitation fundamentals once access is gained
-
Evading antivirus and modern endpoint detection
Metasploit accelerates exploitation, but understanding how it works—and when to use it—is what separates beginners from professionals.
Module 5: Manual Exploitation
Automated tools will not always succeed. You will learn to exploit manually when frameworks fail:
-
Web application exploitation — SQL injection, file upload vulnerabilities, command injection
-
Service exploitation — Manual exploitation of services like SMB, SSH, FTP, and RDP
-
Payload crafting — Creating custom payloads for specific targets
-
Bypassing security controls — Evading WAFs, EDR, and application whitelisting
-
Public exploit adaptation — Taking public Proof of Concept (PoC) code and adapting it to your target environment
This module transforms you from a tool operator into a real penetration tester.
Module 6: Pivoting — Expanding Your Foothold
The external breach is just the beginning. Once you gain access to a perimeter system, you will learn to pivot:
-
Network pivoting — Using a compromised host as a proxy to access internal networks
-
Port forwarding — Creating tunnels to reach systems not directly accessible
-
Proxychains — Routing tools through compromised hosts
-
Meterpreter pivoting — Native Metasploit pivoting techniques
-
SSH tunneling — Creating encrypted tunnels through compromised systems
Pivoting is how a single compromised web server becomes a bridge to internal Active Directory, database servers, and ultimately the crown jewels of the organization.
Course Philosophy
This course is built on three foundational principles:
1. Methodology Over Memorization
You will not simply memorize commands. You will learn a repeatable methodology that you can apply to any external penetration test, regardless of the target. Tools change; methodology endures.
2. Automation and Manual Skills
We embrace automation for efficiency—but we never rely on it blindly. You will learn to use tools like Metasploit and Nessus effectively, but also to step outside them when automation fails. The most skilled testers are those who know when to use a tool and when to go manual.
3. Real-World Scenarios
Every lab in this course simulates a real-world external engagement. You will face:
-
Targets with modern security controls (firewalls, IDS/IPS, WAFs)
-
Mixed environments (Windows, Linux, cloud assets)
-
Realistic misconfigurations and vulnerabilities
-
Time-boxed engagements that mirror professional constraints
Prerequisites & Tools
What You Should Know
-
Basic networking concepts (TCP/IP, ports, protocols, routing)
-
Familiarity with Linux command line
-
Understanding of common services (HTTP, FTP, SSH, SMB, DNS)
-
Basic understanding of web application concepts (helpful but not required)
Tools You Will Master
-
OSINT: theHarvester, Amass, Shodan, Recon-ng, Sublist3r, DNSrecon
-
Scanning: Nmap, Masscan, Zmap, RustScan
-
Vulnerability Scanning: Nessus, OpenVAS, Nmap NSE
-
Exploitation: Metasploit Framework, Searchsploit
-
Manual Exploitation: Burp Suite, SQLmap, Custom scripting (Python/Bash)
-
Pivoting: Proxychains, SSH tunneling, Metasploit pivoting, Chisel, Ligolo-ng
Lab Environment
You will have access to:
-
Target Range: A realistic external network with multiple vulnerable services, firewalls, and segmentation
-
Attack Machine: Kali Linux with all tools preconfigured
-
Isolated Network: Safe, legal environment for practicing attacks
-
Multiple Scenarios: Web applications, network services, misconfigured systems
The Importance of Reporting
A penetration test is not complete until it is documented. Throughout this course, you will learn to:
-
Document findings with evidence and reproduction steps
-
Prioritize vulnerabilities by risk and business impact
-
Write clear, actionable remediation guidance
-
Communicate technical findings to both technical and non-technical audiences
Professional pentesters are judged not only by what they find, but by how effectively they communicate it. You will leave this course able to produce reports that drive real security improvements.
A Note on Ethics and Legality
This course teaches offensive techniques for one purpose: authorized security testing.
Every technique demonstrated is a real-world adversary technique. Understanding these methods is essential for defenders, but with that knowledge comes responsibility.
You must never:
-
Test systems you do not own
-
Test systems without explicit written authorization
-
Use these techniques for malicious purposes
-
Share findings or data from authorized tests
The difference between a penetration tester and an attacker is authorization. Crossing that line has legal consequences. This course prepares you to operate ethically and professionally within the bounds of authorized engagements.
What You Will Achieve
By the end of this course, you will be able to:
-
Conduct OSINT to map external attack surfaces without touching target networks
-
Perform systematic network reconnaissance to discover live hosts and services
-
Identify and validate vulnerabilities using both automated and manual techniques
-
Exploit vulnerabilities using Metasploit and manual methods to gain initial access
-
Pivot from perimeter systems into internal networks
-
Document and report findings in a professional, actionable format
-
Approach external engagements with a repeatable, methodology-driven mindset
Whether you are pursuing a career in penetration testing, preparing for certifications like OSCP or PNPT, or looking to strengthen your organization’s security posture, this course will give you the practical skills to succeed.
Ready to Begin?
The target is waiting. Your first objective: learn everything you can about them without ever touching their network.
Open your terminal. Start your reconnaissance. The perimeter is only as strong as its weakest exposed service—and you are about to find it.
Let’s attack.
