YoVDO

Recon Fundamentals by Example

Offered By: NahamSec via YouTube

Tags

NahamCon Courses Cybersecurity Courses Information Gathering Courses Offensive Security Courses Reconnaissance Courses

Course Description

Overview

Explore recon fundamentals through practical examples in this conference talk from #NahamCon2022. Dive into offensive security techniques as @codingo demonstrates essential reconnaissance strategies for bug bounty hunters and penetration testers. Learn how to effectively gather information, identify potential vulnerabilities, and improve your overall recon process. Gain insights from real-world scenarios and discover tools and methodologies that can enhance your ability to uncover security weaknesses in target systems.

Syllabus

#NahamCon2022 - @codingo: Recon Fundamentals by Example


Taught by

NahamSec

Related Courses

Reversing Web Assembly
NahamSec via YouTube
Blackbox Monitoring for Timely Bug Detection
NahamSec via YouTube
Continuous Intrusion - Hacking CI Systems
NahamSec via YouTube
Breaking Into Cloud Wallets - Hacking Crypto Web Apps
NahamSec via YouTube
Effectively Finding Vulnerabilities by Debugging the Source Code
NahamSec via YouTube