Red Team Reconnaissance Techniques
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore active and passive reconnaissance techniques used in Red Team operations through this comprehensive video. Delve into methods for gathering crucial information about target organizations, infrastructure, and personnel to support various phases of adversary operations. Learn how collected data can be leveraged for initial access, post-compromise objectives, and further reconnaissance efforts. Discover tools like Sn1per and OWASP Amass, and gain insights into the MITRE ATT&CK Framework. Access additional resources, including a detailed writeup and links to related content, to enhance your understanding of Red Team reconnaissance strategies and their applications in cybersecurity.
Syllabus
Red Team Reconnaissance Techniques
Taught by
HackerSploit
Related Courses
The RedTeam Blueprint - A Unique Guide To Ethical HackingUdemy Red Team Ethical Hacking - Beginner
Udemy Active Directory Pentesting Full Course - Red Team Hacking
Udemy Active Directory Pentesting With Kali Linux - Red Team
Udemy Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight