Footprinting Techniques for Offensive Security
Offered By: YouTube
Course Description
Overview
Explore an in-depth conference talk on footprinting techniques in cybersecurity. Delve into various subtopics, including DNS analysis, zone transfers, and Whois lookups. Learn about the importance of footprinting in security assessments and discover practical Linux-based tools and methods. Gain insights into DNS record types, list scanning, and account verification. Follow along with live demonstrations and real-world examples to enhance your understanding of these critical reconnaissance techniques.
Syllabus
Intro
About me
Class structure
Whats out there
Subtopics
Why Footprinting
Disclaimer
Linux
DNS
DNS lookup
Types of records
Finding DNS records
Dig
Zone Transfer
Linux Zone Transfer
Other Techniques
List Scan
Whois
Whois Demo
Looking up information
Traceroute
Finding
Checking Accounts
Related Courses
Complete Cyber Security Course: Go From Zero To HeroUdemy Kali Linux Hacking Lab for Beginners
Udemy Learn Ethical Hacking: Beginner to Advanced
Udemy The Ethical Hacking Starter Kit: 12 Techniques
Udemy Ethical Hacking: Footprinting and Reconnaissance
LinkedIn Learning