Look Ma No Exploits - The Recon-ng Framework
Offered By: YouTube
Course Description
Overview
Explore the Recon-ng Framework in this comprehensive conference talk from DerbyCon 3.0. Dive into advanced reconnaissance techniques, learning about UI highlights, interactive commands, smart loading, and workspaces. Discover methodologies for host harvesting, brute force DNS, and reverse IP lookups. Examine serverside enumeration, vulnerability discovery, and port scanning. Gain insights into social engineering tactics, data manipulation, and expanding datasets. Learn about building contacts, credential checking, and reporting. Enhance your cybersecurity skills with practical demonstrations and expert guidance on leveraging this powerful reconnaissance tool.
Syllabus
Intro
Who am I
Who are you
Disclaimer
The Year of Recon
Traditional Recon
Advanced Recon
Time
caveats
Recon Ng Framework
UI Highlights
Interactive Commands
Smart Loading
Workspaces
Bug Report
Methodology
Host Harvesting
Brute Force DNS
NetCraft Demo
Host Data
Resolving Host Names
Reverse IP Lookup
Filters
Geolocation
View Host
Serverside Enumeration
Vulnerability Discovery
FBI
Hyperion
Port Scan
Gathering Contacts
Data Manipulation
Social Engineering
Logic of Loss
Expanding Data
Building Contacts
FBIgov
Load Who
First Name
Last Name
NameMangle
NameCheck
Credentials
Demo
LeakedDB
Pushpin
Discovery
Reporting
Thank you
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network