Recon Methodology Using SecurityTrails, FDNS, Whoxy, and More
Offered By: NahamSec via YouTube
Course Description
Overview
Explore an in-depth hacker's recon methodology in this comprehensive video featuring Codingo's approach to reconnaissance. Discover how to leverage powerful tools such as SecurityTrails, FDNS, and Whoxy to enhance your bug bounty hunting and penetration testing skills. Gain valuable insights into effective information gathering techniques and learn how to optimize your recon process for better results in cybersecurity assessments. Delve into the intricacies of various recon tools and understand how to integrate them into your workflow for more efficient and thorough investigations.
Syllabus
codingo_ Shares His Recon Approach Using SecurityTrails, FDNS, Whoxy and more!
Taught by
NahamSec
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent