YoVDO

Five Phases of Hacking + Passive OSINT

Offered By: Cyber Mentor via YouTube

Tags

OSINT (Open Source Intelligence) Courses Cybersecurity Courses Ethical Hacking Courses Reconnaissance Courses

Course Description

Overview

Dive into a comprehensive 3-hour video tutorial on ethical hacking, focusing on the five phases of hacking and passive Open Source Intelligence (OSINT) techniques. Learn about crucial OSINT tools and methodologies, including Hunter.io, breach-parse for password hunting, website and map reconnaissance, employee OSINT, Google Fu, theharvester, Have I Been Pwned?, Bluto, crt.sh, Wappalyzer, whatweb, and BuiltWith. Gain practical insights into passive reconnaissance and information gathering techniques essential for penetration testing and cybersecurity assessments. Conclude with an informative Q&A session to address specific queries and deepen your understanding of ethical hacking practices.

Syllabus

- Stream starts.
- Five Stages of Hacking.
- Passive Recon Introduction.
- Passive OSINT as a group.
- Hunter.io.
- Hunting for cleartext passwords / My custom tool "breach-parse".
- Website and map recon.
- Employee OSINT.
- Google Fu.
- theharvester.
- Have I Been Pwned?.
- Bluto.
- crt.sh.
- Wappalyzer.
- whatweb.
- BuiltWith.
- Starts.


Taught by

The Cyber Mentor

Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
The Complete Ethical Hacking Course!
Udemy
Ethical Hacking: Footprinting and Reconnaissance
LinkedIn Learning
Applied Ethical Hacking and Rules of Engagement
Udemy
Discovery with ADRecon
Pluralsight