User Avatar

External Attacker

Lifetime
Intermediate
8 lessons
0 quizzes
0 students
This course will be coming soon

External Network Attacks

Welcome to External Network Attacks —a hands-on, methodology-driven course that teaches you how to approach a penetration test from the outside-in, just as real-world adversaries do.

If you are here, you understand that every security engagement begins at the perimeter. Before there is a foothold, before there is lateral movement, before there is domain dominance—there is the external network. It is the front door. And in many organizations, that front door is not as secure as they believe.

This course is about mastering the external penetration testing methodology. From the moment you receive a target scope to the moment you establish your first foothold, you will learn the tools, techniques, and mindset required to systematically identify and exploit vulnerabilities in internet-facing infrastructure.


The External Penetration Testing Mindset

External penetration testing simulates what an attacker sees: a target organization with no prior access, no internal credentials, and no insider knowledge. You start with nothing but a domain name or IP range and build your understanding from the ground up.

This requires a fundamentally different approach than internal testing:

Internal Testing External Testing
Assumes network access Starts from the internet
Credentials often available No credentials initially
Lateral movement focus Perimeter breach focus
Active Directory centric Infrastructure centric
Known environment Unknown environment

Your goal is not simply to “find vulnerabilities”—it is to simulate a real attack from an external perspective, documenting what an adversary could achieve and how the organization can defend against it.


The External Attack Lifecycle

Every external penetration test follows a structured methodology. You will learn each phase in depth:

text
OSINT & Reconnaissance → Network Scanning → Vulnerability Assessment → Exploitation → Pivoting → Reporting
Phase What You Will Learn
OSINT & Reconnaissance Gathering intelligence from public sources—DNS records, subdomains, email addresses, leaked credentials, technology stacks—without ever touching the target network
Network Scanning Discovering live hosts, open ports, and running services across the external attack surface using modern scanning techniques
Vulnerability Assessment Identifying known vulnerabilities in discovered services, prioritizing targets based on exploitability and impact
Exploitation (Metasploit) Leveraging the industry-standard exploitation framework to gain initial access quickly and reliably
Manual Exploitation Moving beyond automated tools to exploit complex vulnerabilities, craft custom payloads, and bypass security controls
Pivoting Transforming a single compromised host into a beachhead for accessing internal networks, bypassing firewalls, and expanding the attack surface

What You Will Learn

Module 1: OSINT — Open Source Intelligence

Before you scan a single IP address, you will learn to gather intelligence from the open internet. Using tools like theHarvester, Shodan, Censys, Amass, and DNS recon tools, you will:

  • Discover subdomains and uncover forgotten infrastructure

  • Identify employee email addresses for phishing simulations

  • Find exposed credentials in public data breaches

  • Map technology stacks without sending a single packet

OSINT is the art of knowing your target before they know you. It often reveals the easiest path inside.

Module 2: Network Reconnaissance & Port Scanning

With your intelligence gathered, you will learn to map the external attack surface. Using Nmap, masscan, and Zmap, you will:

  • Discover live hosts across IP ranges

  • Perform stealth scanning to avoid detection

  • Identify open ports, running services, and operating systems

  • Enumerate service banners and version information

You will learn not just the commands, but the art of scanning—balancing speed against stealth, depth against detection, and coverage against noise.

Module 3: Vulnerability Scanning

Armed with service information, you will learn to identify known vulnerabilities. Using Nessus, OpenVAS, and Nmap NSE scripts, you will:

  • Automate vulnerability discovery across hundreds of hosts

  • Validate findings to eliminate false positives

  • Prioritize vulnerabilities by severity and exploitability

  • Correlate findings with OSINT data for targeted exploitation

Vulnerability scanning is not about running a tool and printing a report. You will learn to interpret results, identify misconfigurations, and distinguish real risk from noise.

Module 4: Exploitation with Metasploit

Metasploit is the industry standard for exploitation—and you will master it. You will learn:

  • Navigating the Metasploit framework and its module structure

  • Matching vulnerabilities to exploits

  • Configuring payloads (reverse shells, Meterpreter, bind shells)

  • Post-exploitation fundamentals once access is gained

  • Evading antivirus and modern endpoint detection

Metasploit accelerates exploitation, but understanding how it works—and when to use it—is what separates beginners from professionals.

Module 5: Manual Exploitation

Automated tools will not always succeed. You will learn to exploit manually when frameworks fail:

  • Web application exploitation — SQL injection, file upload vulnerabilities, command injection

  • Service exploitation — Manual exploitation of services like SMB, SSH, FTP, and RDP

  • Payload crafting — Creating custom payloads for specific targets

  • Bypassing security controls — Evading WAFs, EDR, and application whitelisting

  • Public exploit adaptation — Taking public Proof of Concept (PoC) code and adapting it to your target environment

This module transforms you from a tool operator into a real penetration tester.

Module 6: Pivoting — Expanding Your Foothold

The external breach is just the beginning. Once you gain access to a perimeter system, you will learn to pivot:

  • Network pivoting — Using a compromised host as a proxy to access internal networks

  • Port forwarding — Creating tunnels to reach systems not directly accessible

  • Proxychains — Routing tools through compromised hosts

  • Meterpreter pivoting — Native Metasploit pivoting techniques

  • SSH tunneling — Creating encrypted tunnels through compromised systems

Pivoting is how a single compromised web server becomes a bridge to internal Active Directory, database servers, and ultimately the crown jewels of the organization.


Course Philosophy

This course is built on three foundational principles:

1. Methodology Over Memorization

You will not simply memorize commands. You will learn a repeatable methodology that you can apply to any external penetration test, regardless of the target. Tools change; methodology endures.

2. Automation and Manual Skills

We embrace automation for efficiency—but we never rely on it blindly. You will learn to use tools like Metasploit and Nessus effectively, but also to step outside them when automation fails. The most skilled testers are those who know when to use a tool and when to go manual.

3. Real-World Scenarios

Every lab in this course simulates a real-world external engagement. You will face:

  • Targets with modern security controls (firewalls, IDS/IPS, WAFs)

  • Mixed environments (Windows, Linux, cloud assets)

  • Realistic misconfigurations and vulnerabilities

  • Time-boxed engagements that mirror professional constraints


Prerequisites & Tools

What You Should Know

  • Basic networking concepts (TCP/IP, ports, protocols, routing)

  • Familiarity with Linux command line

  • Understanding of common services (HTTP, FTP, SSH, SMB, DNS)

  • Basic understanding of web application concepts (helpful but not required)

Tools You Will Master

  • OSINT: theHarvester, Amass, Shodan, Recon-ng, Sublist3r, DNSrecon

  • Scanning: Nmap, Masscan, Zmap, RustScan

  • Vulnerability Scanning: Nessus, OpenVAS, Nmap NSE

  • Exploitation: Metasploit Framework, Searchsploit

  • Manual Exploitation: Burp Suite, SQLmap, Custom scripting (Python/Bash)

  • Pivoting: Proxychains, SSH tunneling, Metasploit pivoting, Chisel, Ligolo-ng

Lab Environment

You will have access to:

  • Target Range: A realistic external network with multiple vulnerable services, firewalls, and segmentation

  • Attack Machine: Kali Linux with all tools preconfigured

  • Isolated Network: Safe, legal environment for practicing attacks

  • Multiple Scenarios: Web applications, network services, misconfigured systems


The Importance of Reporting

A penetration test is not complete until it is documented. Throughout this course, you will learn to:

  • Document findings with evidence and reproduction steps

  • Prioritize vulnerabilities by risk and business impact

  • Write clear, actionable remediation guidance

  • Communicate technical findings to both technical and non-technical audiences

Professional pentesters are judged not only by what they find, but by how effectively they communicate it. You will leave this course able to produce reports that drive real security improvements.


A Note on Ethics and Legality

This course teaches offensive techniques for one purpose: authorized security testing.

Every technique demonstrated is a real-world adversary technique. Understanding these methods is essential for defenders, but with that knowledge comes responsibility.

You must never:

  • Test systems you do not own

  • Test systems without explicit written authorization

  • Use these techniques for malicious purposes

  • Share findings or data from authorized tests

The difference between a penetration tester and an attacker is authorization. Crossing that line has legal consequences. This course prepares you to operate ethically and professionally within the bounds of authorized engagements.


What You Will Achieve

By the end of this course, you will be able to:

  • Conduct OSINT to map external attack surfaces without touching target networks

  • Perform systematic network reconnaissance to discover live hosts and services

  • Identify and validate vulnerabilities using both automated and manual techniques

  • Exploit vulnerabilities using Metasploit and manual methods to gain initial access

  • Pivot from perimeter systems into internal networks

  • Document and report findings in a professional, actionable format

  • Approach external engagements with a repeatable, methodology-driven mindset

Whether you are pursuing a career in penetration testing, preparing for certifications like OSCP or PNPT, or looking to strengthen your organization’s security posture, this course will give you the practical skills to succeed.


Ready to Begin?

The target is waiting. Your first objective: learn everything you can about them without ever touching their network.

Open your terminal. Start your reconnaissance. The perimeter is only as strong as its weakest exposed service—and you are about to find it.

Let’s attack.

User Avatar

Jonathan Wallace

Jonathan Wallace is a Senior Offensive Cyber Security engineer with decades of experience in working with Information Technology across various fields. He is the senior penetration tester at Cyberforce Security and also puts a lot of effort, care and attention in to developing training courses and contributing to the Cyber security community.