YoVDO

Bumper Massage Application Recon - The Lost Art - Tony Miller

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Google Hacking Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the lost art of application reconnaissance in this 47-minute conference talk by Tony Miller at GrrCON 2015. Dive into advanced Google search techniques, including Google hacking and advanced operators, to uncover hidden information about web applications. Learn how to leverage the Google Hacking Database, find admin logins, and discover vulnerable Axis cameras. Explore DNS records, cloud services, and social media for valuable intel. Discover techniques for identifying developers and extracting document metadata. Apply these skills in practice using Google Dorks, ExploitDB, and other tools. Master the art of passive reconnaissance to enhance your cybersecurity knowledge and skills.

Syllabus

Intro
Application Recon
Recon
Story
Google
Google Search
Top 5 Findings
Google Hacking
Types of Google Hacking
Google Advanced Operators
Intitle Index
Google Hacking Database
Finding Admin Logins
Axis Cameras
Web Services
Google Hacking Tools
DNS Records
Cloud
OpenBSD
Subroot
Social Media
Finding Developers
Document Metadata
How do we put this into practice
Google Dorks
ExploitDB
Showit
MultiGo
FOAP
Medic
Passive Recon


Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent