YoVDO

What I Know About Your Company OSINT and Hacking LinkedIn Business Processes

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Digital Forensics Courses Social Engineering Courses LinkedIn Courses Reconnaissance Courses

Course Description

Overview

Explore advanced techniques for gathering intelligence and exploiting vulnerabilities in LinkedIn's business processes in this 36-minute conference talk from HouSecCon 6. Delve into reconnaissance methods, scripting techniques, and ways to overcome LinkedIn's obstacles. Learn how to leverage advanced search features, utilize open-source resources, and exploit the mobile API. Discover the potential risks of false identities and the implications for social engineering. Gain insights into job postings and their role in information gathering. Understand the threats posed by these techniques and their potential impact on organizations.

Syllabus

Introduction
About Danny
Reconnaissance
Getting Information
Recon
Scripting
American Registry
LinkedIn Obstacles
Exploring LinkedIn
Advanced Search
Gatherer
Example
Questions
Traffic Restrictions
Out of Network
Full Name Search
Open Source Resources
Mobile API
Make a false identity
What kind of information are they using
This is a threat
If they want to
Useful in social engineering
Job postings


Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
The Complete Ethical Hacking Course!
Udemy
Ethical Hacking: Footprinting and Reconnaissance
LinkedIn Learning
Applied Ethical Hacking and Rules of Engagement
Udemy
Discovery with ADRecon
Pluralsight