YoVDO

Look Ma No Exploits - The Recon-ng Framework

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses Ethical Hacking Courses Geolocation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the Recon-ng Framework in this comprehensive conference talk from DerbyCon 3.0. Dive into advanced reconnaissance techniques, learning about UI highlights, interactive commands, smart loading, and workspaces. Discover methodologies for host harvesting, brute force DNS, and reverse IP lookups. Examine serverside enumeration, vulnerability discovery, and port scanning. Gain insights into social engineering tactics, data manipulation, and expanding datasets. Learn about building contacts, credential checking, and reporting. Enhance your cybersecurity skills with practical demonstrations and expert guidance on leveraging this powerful reconnaissance tool.

Syllabus

Intro
Who am I
Who are you
Disclaimer
The Year of Recon
Traditional Recon
Advanced Recon
Time
caveats
Recon Ng Framework
UI Highlights
Interactive Commands
Smart Loading
Workspaces
Bug Report
Methodology
Host Harvesting
Brute Force DNS
NetCraft Demo
Host Data
Resolving Host Names
Reverse IP Lookup
Filters
Geolocation
View Host
Serverside Enumeration
Vulnerability Discovery
FBI
Hyperion
Port Scan
Gathering Contacts
Data Manipulation
Social Engineering
Logic of Loss
Expanding Data
Building Contacts
FBIgov
Load Who
First Name
Last Name
NameMangle
NameCheck
Credentials
Demo
LeakedDB
Pushpin
Discovery
Reporting
Thank you


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network