Ethical Hacking: Reconnaissance/Footprinting
Pluralsight
Course Summary
This course starts you at the first phase (out of 5) of hacking. You'll begin the process of probing a system with the intent of attacking and compromising the target. This phase consists of either passively or actively acquiring evidence about a target. The goal is to gather as much data as possible about a would-be target with the goal of getting ample data to make future attacks easier and more directed. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
As an Ethical Hacker, you've been asked to do a "Blackbox" attack on a customer's infrastructure. Your first step is finding out as much as you can about the "target." You accomplish this via reconnaissance/footprinting. This is the initial stage in gaining a blueprint of the security profile of a target, and it is accomplished in an organized manner. Reconnaissance is one of the three "pre-attack phases," and results in a unique profile of an organization's networks and systems. "Reconning" an organization is necessary in order to systematically gather all the related data in regards to the technologies deployed within the network. Reconnaissance can take up to 90% of the time during penetration testing or an actual attack. We'll show you how attackers are currently reconning your company, as well as discuss in detail the steps of reconnaissance. Finally we'll look at some possible countermeasures to help discourage attackers. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
What Do You Mean by Reconnaissance/Footprinting?- 27m 32s
—What Do You Mean by Reconnaissance/Footprinting? 3m 37s
—Why Recon? 3m 28s
—More Reasons Why We Recon 2m 36s
—Types of Recon 4m 13s
—Goals of Recon 9m 40s
—Tools of Recon 2m 50s
—Summary 1m 6sInitially What Do You Look For?- 44m 45s
—Initially What Do You Look For? 1m 56s
—Using Search Engines 4m 31s
—Using Websites 11m 7s
—Using Whois 8m 31s
—Using PING & DNS 4m 59s
—Continuing to Use DNS 6m 23s
—Some Advanced DNS Tricks 5m 55s
—Summary 1m 19sThe More You Look, the More You Find- 31m 23sOther Reconnaissance Techniques- 38m 29sReconnaissance via Google Hacking- 40m 35sReconnaissance Countermeasures & Pen Testing- 26m 15s