YoVDO

Five Phases of Hacking + Passive OSINT

Offered By: Cyber Mentor via YouTube

Tags

OSINT (Open Source Intelligence) Courses Cybersecurity Courses Ethical Hacking Courses Reconnaissance Courses

Course Description

Overview

Dive into a comprehensive 3-hour video tutorial on ethical hacking, focusing on the five phases of hacking and passive Open Source Intelligence (OSINT) techniques. Learn about crucial OSINT tools and methodologies, including Hunter.io, breach-parse for password hunting, website and map reconnaissance, employee OSINT, Google Fu, theharvester, Have I Been Pwned?, Bluto, crt.sh, Wappalyzer, whatweb, and BuiltWith. Gain practical insights into passive reconnaissance and information gathering techniques essential for penetration testing and cybersecurity assessments. Conclude with an informative Q&A session to address specific queries and deepen your understanding of ethical hacking practices.

Syllabus

- Stream starts.
- Five Stages of Hacking.
- Passive Recon Introduction.
- Passive OSINT as a group.
- Hunter.io.
- Hunting for cleartext passwords / My custom tool "breach-parse".
- Website and map recon.
- Employee OSINT.
- Google Fu.
- theharvester.
- Have I Been Pwned?.
- Bluto.
- crt.sh.
- Wappalyzer.
- whatweb.
- BuiltWith.
- Starts.


Taught by

The Cyber Mentor

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network