External Footprinting: Reconnaissance and Mapping
This course will teach you 15+ techniques in the scope of identifying targets, passive and active reconnaissance, hunting weak web applications, and prioritizing your efforts.
A solid understanding of external footprinting techniques is critical to being an effective penetration tester. It can be the difference between breaking into an organization and having little to show for your efforts. This course, External Footprinting: Reconnaissance and Mapping, will challenge you by starting with a real world company and enumerating 10,000+ IPv4/IPv6 addresses and domain names used by the company. You will also get to utilize 15+ techniques for identifying targets, gathering host information, hunting weak web applications, and prioritizing your efforts. When you have finished with this course, you should have a solid understanding of external footprinting, passive/active reconnaissance, and the techniques discussed in the Penetration Testing Execution Standard (PTES). Software Required: Kali Linux.
Course SyllabusCourse Overview- 1m 4s
—Course Overview 1m 4sWelcome to External Footprinting- 9m 28s
—README 1m 50s
—Attack Chains 2m 8s
—Client Interactions 3m 0s
—Getting the Gold 2m 7s
—Summary 0m 21sPassive Reconnaissance- 21m 35sActive Reconnaissance- 19m 44sPrioritizing External Target List- 18m 20sCountermeasures and Reporting- 10m 57s