Sharing Is Caring:

Ethical Hacking – Phase 1 – Reconnaissance

  • Performing Basic Information Gathering
  • Free tutorial
  • Rating: 4.5 out of 54.5 (86 ratings)
  • 7,777 students
  • 1hr 59min of on-demand video
  • Created by Arthur Salmon

English

What you’ll learn

  • Examine and learn ethical hacking reconnaissance techniques
  • Explore both active & passive footprinting
  • Review Google Dorking techniques

Requirements

  • Basic IT Skill, Example: Being able to use a computer device at a beginner level.
  • Good computer with at least 4GB RAM and reliable internet connection
  • Require patience and time to spend on this course.

Description

Kali is a penetration testing Linux distribution created by Offensive Security. It holds a repository of multiple tools for security-related engineers including hacking wireless networks, web applications, databases, Reverse engineering, password crackers, and much more! As you can see, Kali is a versatile and powerful tool for anyone looking to do any cybersecurity-related work.

Keep in mind this is a basics course, which means this course is a beginner’s guide Ethical Hacking – Phase 1 – Reconnaissance. We will cover Active and Passive techniques, and the tools used to perform the information gathering and reconnaissance. The main purpose of information Gathering is getting to know the target systems. This is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.

Read Also -->   Linux Basics - Operating System & Basic Terminal commands

The course is broken into three main sections, and an introduction section, and we wrap up with a project to ensure you understand the process of information gathering and reconnaissance. The goal is to provide you with basic knowledge to get you started so you can take it from there. Remember this is not a field that you have can walkthrough. You will have to grow and adapt as the environment changes.

Remember this is a basic overview of information gathering and reconnaissance, the hope is you get in, understand the principles. Work through the assignments and exercises to help solidify your understanding of the topics covered in this course.

Who this course is for:

  • Anybody who want to learn about Ethical Hacking reconnaissance techniques
  • Any person willing to learn how to make their own penetration testing lab

Show less

Course content

5 sections • 24 lectures • 1h 58m total lengthCollapse all sections

Introduction4 lectures • 12min

  • Introduction02:35
  • Terminology02:09
  • Terminology2 questions
  • Assumptions01:12
  • Victims05:40
  • Victims3 questions

Passive Information Gathering11 lectures • 1hr 6min

  • Passive Overview01:08
  • OSINT04:06
  • OSINT5 questions
  • Search Engines09:57
  • Search Engines3 questions
  • Dorking10:56
  • Dorking5 questions
  • Dorking5 questions
  • Terminal Commands06:49
  • Terminal Commands5 questions
  • DNSenum03:03
  • DNSenum1 question
  • Netcraft & Dmitry08:27
  • Banner Grabbing04:29
  • Recon-ng06:11
  • theHarvester04:07
  • Spiderfoot06:34
  • Passive Information Gathering Wrap-up1 question

Active Information Gathering7 lectures • 30min

  • Active Reconnaissance Overview01:02
  • Port Scanning Tools05:16
  • Port Scanning Tools2 questions
  • Web Service Review Tools – Nikto03:09
  • Web Service Review Tools – DirBuster06:00
  • Web Service Review Tools – DirBuster1 question
  • Web Service Review Tools – ZAP04:16
  • Web Service Review Tools – Burpsuite04:33
  • Network Vulnerability Scanning Tools05:16
  • Active Information Gathering Wrap-up1 question

Hybrid Reconnaissance1 lecture • 10min

  • Maltego10:07
  • Maltego1 question
Read Also -->   Learn Photoshop Retouching To Improve Looks

Competency Based Project1 lecture • 2min

  • Project01:57
  • Project1 question

👇👇👇👇 Click Below to Enroll in Free Udemy Course 👇👇👇👇

Go to Course

👇👇 See Also 👇👇

Join Us Join Us Join Us
Sharing Is Caring:

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO