YoVDO

How to Use Amass Efficiently

Offered By: NahamSec via YouTube

Tags

NahamCon Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Information Gathering Courses Reconnaissance Courses

Course Description

Overview

Discover the intricacies of efficient Amass usage in this comprehensive conference talk from NahamCon2020. Delve into expert insights shared by @jeff_foley as he explores advanced techniques and best practices for leveraging Amass, a powerful open-source information gathering tool. Learn how to optimize your reconnaissance processes, enhance your attack surface mapping capabilities, and streamline your cybersecurity workflows. Gain valuable knowledge on maximizing Amass's potential to uncover hidden subdomains, identify network boundaries, and gather critical intelligence for your security assessments or bug bounty hunting endeavors.

Syllabus

How to Use Amass Efficiently by @jeff_foley #NahamCon2020


Taught by

NahamSec

Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
The Complete Ethical Hacking Course!
Udemy
Ethical Hacking: Footprinting and Reconnaissance
LinkedIn Learning
Applied Ethical Hacking and Rules of Engagement
Udemy
Discovery with ADRecon
Pluralsight