Red Team Recon Techniques - Red Team Series
Offered By: Linode via YouTube
Course Description
Overview
Syllabus
Introduction
What is Reconnaissance?
Mitre Attack Recon Techniques Overview
Let’s Begin with Passive Reconnaissance
Using the host command
Using the nslookup command
Using the traceroute command
Using the dnsrecon command Passively
Using the wafw00f command
Using the dig command
Using the WHOIS Utility
Using Netcraft
Using DNS Dumpster
Using whatweb
Using Browser Addons
Gathering Employee Information
Using the Harvester
Subdomain Enumeration
Active Intelligence Gathering
Using dnsrecon Actively
Brute Forcing Subdomains with Fierce
Using knockpy
Using Port Scanning
Vulnerability Scanning
Directory Brute Forcing
Automating these Tests
Scanning with Sniper Active
Scanning with Sniper Passively
Using Amass - Basic Scan
Using Amass - Advanced Scan
Using the viz Subcommand
Viewing Reports
Performing Passive Recon with recon-ng
Conclusion
Taught by
Linode
Related Courses
Security Assessment and TestingPackt via Coursera Windows Red Team Exploitation Techniques | Red Team Series 3-13
Linode via Independent PowerShell for Security Professionals
LinkedIn Learning Assessing Red Team Post Exploitation Activity
Pluralsight Privilege Escalation with UACMe
Pluralsight