Five Phases of Hacking + Passive OSINT
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Dive into a comprehensive 3-hour video tutorial on ethical hacking, focusing on the five phases of hacking and passive Open Source Intelligence (OSINT) techniques. Learn about crucial OSINT tools and methodologies, including Hunter.io, breach-parse for password hunting, website and map reconnaissance, employee OSINT, Google Fu, theharvester, Have I Been Pwned?, Bluto, crt.sh, Wappalyzer, whatweb, and BuiltWith. Gain practical insights into passive reconnaissance and information gathering techniques essential for penetration testing and cybersecurity assessments. Conclude with an informative Q&A session to address specific queries and deepen your understanding of ethical hacking practices.
Syllabus
- Stream starts.
- Five Stages of Hacking.
- Passive Recon Introduction.
- Passive OSINT as a group.
- Hunter.io.
- Hunting for cleartext passwords / My custom tool "breach-parse".
- Website and map recon.
- Employee OSINT.
- Google Fu.
- theharvester.
- Have I Been Pwned?.
- Bluto.
- crt.sh.
- Wappalyzer.
- whatweb.
- BuiltWith.
- Starts.
Taught by
The Cyber Mentor
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network