YoVDO

How to Use Amass Efficiently

Offered By: NahamSec via YouTube

Tags

NahamCon Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses Information Gathering Courses Reconnaissance Courses

Course Description

Overview

Discover the intricacies of efficient Amass usage in this comprehensive conference talk from NahamCon2020. Delve into expert insights shared by @jeff_foley as he explores advanced techniques and best practices for leveraging Amass, a powerful open-source information gathering tool. Learn how to optimize your reconnaissance processes, enhance your attack surface mapping capabilities, and streamline your cybersecurity workflows. Gain valuable knowledge on maximizing Amass's potential to uncover hidden subdomains, identify network boundaries, and gather critical intelligence for your security assessments or bug bounty hunting endeavors.

Syllabus

How to Use Amass Efficiently by @jeff_foley #NahamCon2020


Taught by

NahamSec

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent