Ethical Hacking - Footprinting & Reconnaissance {AM}

seeders: 1
leechers: 1
Added on June 28, 2016 by AceMerlinin Other > Tutorials
Torrent verified.



Ethical Hacking - Footprinting & Reconnaissance {AM} (Size: 220.66 MB)
 AM.Torrents.nfo4.81 KB
 455717_00_02 - What you should know.mp41013.01 KB
 455717_00_03 - Disclaimer.mp42.45 MB
 455717_00_01 - Welcome.mp45.16 MB
 455717_01_01 - Footprinting and reconnaissance.mp410.36 MB
 455717_01_06 - Using AnyWho, Spokeo, and Yansi.mp411.3 MB
 455717_01_05 - Getting social.mp412.73 MB
 455717_01_03 - Search engines and Google hacking.mp415.89 MB
 455717_01_02 - Using competitive intelligence.mp415.95 MB
 455717_01_04 - Website and email footprinting.mp416.63 MB
 455717_02_05 - Using ping and tracert.mp47.31 MB
 455717_02_07 - nslookup and dig.mp48.27 MB
 455717_02_06 - Analyzing the path.mp411.31 MB
 455717_02_10 - Footprinting pen testing and reports.mp412.83 MB
 455717_02_04 - Understanding ICMP.mp413.1 MB
 455717_02_08 - OSINT tools.mp413.54 MB
 455717_02_01 - Mirroring websites.mp413.9 MB
 455717_02_02 - Footprinting network and DNS.mp414.23 MB
 455717_02_09 - Footprinting countermeasures.mp415.49 MB
 455717_02_03 - Domain name generators.mp417.13 MB
 455717_03_01 - Summary.mp42.07 MB

Description

Ethical Hacking: Footprinting and Reconnaissance with Lisa Bock

If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.

Level: Intermediate
Length: 1h 20m
Released: April 28, 2016

Topics include:
Using competitive intelligence
Hacking with search engines
Using email for footprinting
Getting social
Mirroring websites
Using Ping, Tracert, nslookup, and dig
Taking footprinting countermeasures
Pen testing for footprinting


image

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
220.66 MB
seeders:1
leechers:1
Ethical Hacking - Footprinting & Reconnaissance {AM}