Home| All soft| Last soft| Your Orders| Customers opinion| Helpdesk| Cart

Program Search:


Shopping Cart:




*Note: Minimum order price: €20
We Recommend:

Pluralsight Ethical Hacking Reconnaissance Footprinting €15 buy download

2015
Pluralsight
Dale Meredith
3:28
English

This course is part of the 20 course Ethical Hacking Series. As an Ethical Hacker, you've been asked to do a "Blackbox" attack on a customer's infrastructure. Your first step is finding out as much as you can about the "target." You accomplish this via reconnaissance/footprinting. This is the initial stage in gaining a blueprint of the security profile of a target, and it is accomplished in an organized manner. Reconnaissance is one of the three "pre-attack phases," and results in a unique profile of an organization's networks and systems. "Reconning" an organization is necessary in order to systematically gather all the related data in regards to the technologies deployed within the network. Reconnaissance can take up to 90% of the time during penetration testing or an actual attack. We'll show you how attackers are currently reconning your company, as well as discuss in detail the steps of reconnaissance. Finally we'll look at some possible countermeasures to help discourage attackers.

What Do You Mean by Reconnaissance/Footprinting?
What Do You Mean by Reconnaissance/Footprinting?
Why Recon?
More Reasons Why We Recon
Types of Recon
Goals of Recon
Tools of Recon
Summary
Initially What Do You Look For?
Initially What Do You Look For?
Using Search Engines
Using Websites
Using Whois
Using PING & DNS
Continuing to Use DNS
Some Advanced DNS Tricks
Summary
The More You Look, the More You Find
The More You Look, the More You Find
Job Sites
Social Job Sites
Even More Job Sites
Netcraft
The Wayback Machine
People Search
Summary
Other Reconnaissance Techniques
Other Reconnaissance Techniques
Social Sources
Company: What Can Be Learned?
Facebook
Linkedin
Financial & Competitive Analysis Data
Using Communications to Recon
You've Got Mail Equals I've Got You!
Summary
Reconnaissance via Google Hacking
Reconnaissance via Google Hacking
Understanding Google
The Google Operators
Advanced Google Operators
Using the Operators
Using More Advanced Operators
Applying What You Now Know
The Google Hacking Database
Other Google Hacking Tools
Summary
Reconnaissance Countermeasures & Pen Testing
Reconnaissance Countermeasures & Pen Testing
Countermeasures for Recon
More Countermeasures
Recon Pen Tests
What Should Be on the Report
There's Still More for the Report
Summary




Download File Size:486.63 MB


Pluralsight Ethical Hacking Reconnaissance Footprinting
€15
Customers who bought this program also bought:
  • EC Council Ethical Hacking CEHv7 Videos Tools and Tutorials (20 cd) €20
  • VTC - Advanced Ethical Hacking Course €15
  • Learn The Basics of Ethical Hacking and Penetration Testing Video €20
  • Udemy General Learn The Basics of Ethical Hacking and Penetration Testing €20
  • Udemy Ethical Hacking for beginners Learn the basics of security €10

  • Home| All Programs| Today added Progs| Your Orders| Helpdesk| Shopping cart      





    Adobe Acrobat Pro DC 2022 €70


    Mathworks MATLAB R2022 €105


    Adobe Acrobat Pro DC 2022 for Mac €70






    Windows 11 With Office 2021 €168


    Adobe Master Collection 2022 €265


    CineSamples CineStrings €55






    Intuit QuickBooks Enterprise Solutions 2021 €40


    Mindjet MindManager 2022 €22


    Chief Architect Premier X13 €50