Pluralsight - Ethical Hacking : Reconnaissance-Footprinting

seeders: 26
leechers: 23
Added on September 29, 2015 by TutsMasterin Other > Tutorials
Torrent verified.



Pluralsight - Ethical Hacking : Reconnaissance-Footprinting (Size: 500.42 MB)
 01_01-What Do You Mean by ReconnaissanceFootprinting.mp46.01 MB
 01_02-Why Recon.mp44.92 MB
 01_03-More Reasons Why We Recon.mp43.18 MB
 01_04-Types of Recon.mp44.15 MB
 01_05-Goals of Recon.mp414.11 MB
 01_06-Tools of Recon.mp42.92 MB
 01_07-Summary.mp41.19 MB
 02_01-Initially What Do You Look For.mp43.17 MB
 02_02-Using Search Engines.mp4103.09 KB
 02_03-Using Websites.mp429.35 MB
 02_04-Using Whois.mp419.18 MB
 02_05-Using PING DNS.mp410.79 MB
 02_06-Continuing to Use DNS.mp412.64 MB
 02_07-Some Advanced DNS Tricks.mp415.67 MB
 02_08-Summary.mp41.38 MB
 03_01-The More You Look, the More You Find.mp43.9 MB
 03_02-Job Sites.mp412.85 MB
 03_03-Social Job Sites.mp413.46 MB
 03_04-Even More Job Sites.mp47.96 MB
 03_05-Netcraft.mp4495.08 KB
 03_06-The Wayback Machine.mp413.02 MB
 03_07-People Search.mp45.18 MB
 03_08-Summary.mp42.35 MB
 04_01-Other Reconnaissance Techniques.mp42.79 MB
 04_02-Social Sources.mp44.5 MB
 04_03-Company What Can Be Learned.mp45.74 MB
 04_04-Facebook.mp428.73 MB
 04_05-Linkedin.mp413.1 MB
 04_06-Financial Competitive Analysis Data.mp46.59 MB
 04_07-Using Communications to Recon.mp45.6 MB
 04_08-Youve Got Mail Equals Ive Got You.mp49.34 MB
 04_09-Summary.mp43.18 MB
 05_01-Reconnaissance via Google Hacking.mp42.77 MB
 05_02-Understanding Google.mp44.73 MB
 05_03-The Google Operators.mp410.88 MB
 05_04-Advanced Google Operators.mp48.28 MB
 05_05-Using the Operators.mp413.75 MB
 05_06-Using More Advanced Operators.mp416.44 MB
 05_07-Applying What You Now Know.mp410.7 MB
 05_08-The Google Hacking Database.mp420.85 MB
 05_09-Other Google Hacking Tools.mp43.11 MB
 05_10-Summary.mp41.96 MB
 06_01-Reconnaissance Countermeasures Pen Testing.mp41.91 MB
 06_02-Countermeasures for Recon.mp44.1 MB
 06_03-More Countermeasures.mp45.3 MB
 06_04-Recon Pen Tests.mp48.31 MB
 06_05-What Should Be on the Report.mp46.89 MB
 06_06-Theres Still More for the Report.mp41.28 MB
 06_07-Summary.mp41.5 MB
 ethicalhackingreconnaissancefootprinting.zip110.13 MB

Description

This course is part of the 20 course Ethical Hacking Series. As an Ethical Hacker, you've been asked to do a "Blackbox" attack on a customer's infrastructure. Your first step is finding out as much as you can about the "target." You accomplish this via reconnaissance/footprinting. This is the initial stage in gaining a blueprint of the security profile of a target, and it is accomplished in an organized manner. Reconnaissance is one of the three "pre-attack phases," and results in a unique profile of an organization's networks and systems. "Reconning" an organization is necessary in order to systematically gather all the related data in regards to the technologies deployed within the network. Reconnaissance can take up to 90% of the time during penetration testing or an actual attack. We'll show you how attackers are currently reconning your company, as well as discuss in detail the steps of reconnaissance. Finally we'll look at some possible countermeasures to help discourage attackers.

Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
500.42 MB
seeders:26
leechers:23
Pluralsight - Ethical Hacking : Reconnaissance-Footprinting