Footprinting Techniques for Offensive Security
Offered By: YouTube
Course Description
Overview
Explore an in-depth conference talk on footprinting techniques in cybersecurity. Delve into various subtopics, including DNS analysis, zone transfers, and Whois lookups. Learn about the importance of footprinting in security assessments and discover practical Linux-based tools and methods. Gain insights into DNS record types, list scanning, and account verification. Follow along with live demonstrations and real-world examples to enhance your understanding of these critical reconnaissance techniques.
Syllabus
Intro
About me
Class structure
Whats out there
Subtopics
Why Footprinting
Disclaimer
Linux
DNS
DNS lookup
Types of records
Finding DNS records
Dig
Zone Transfer
Linux Zone Transfer
Other Techniques
List Scan
Whois
Whois Demo
Looking up information
Traceroute
Finding
Checking Accounts
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity