Главная
Study mode:
on
1
Introduction
2
What is Reconnaissance?
3
Mitre Attack Recon Techniques Overview
4
Let’s Begin with Passive Reconnaissance
5
Using the host command
6
Using the nslookup command
7
Using the traceroute command
8
Using the dnsrecon command Passively
9
Using the wafw00f command
10
Using the dig command
11
Using the WHOIS Utility
12
Using Netcraft
13
Using DNS Dumpster
14
Using whatweb
15
Using Browser Addons
16
Gathering Employee Information
17
Using the Harvester
18
Subdomain Enumeration
19
Active Intelligence Gathering
20
Using dnsrecon Actively
21
Brute Forcing Subdomains with Fierce
22
Using knockpy
23
Using Port Scanning
24
Vulnerability Scanning
25
Directory Brute Forcing
26
Automating these Tests
27
Scanning with Sniper Active
28
Scanning with Sniper Passively
29
Using Amass - Basic Scan
30
Using Amass - Advanced Scan
31
Using the viz Subcommand
32
Viewing Reports
33
Performing Passive Recon with recon-ng
34
Conclusion
Description:
Dive into an extensive video tutorial on red team reconnaissance techniques, part of the HackerSploit Red Team series. Explore both passive and active intelligence gathering methods, including DNS analysis, subdomain enumeration, port scanning, and vulnerability assessment. Learn to use various tools such as host, nslookup, traceroute, dnsrecon, wafw00f, dig, WHOIS, Netcraft, DNS Dumpster, whatweb, and browser add-ons for passive reconnaissance. Discover active techniques using tools like Fierce, knockpy, Sniper, Amass, and recon-ng. Gain insights into automating tests, visualizing results, and generating comprehensive reports. Master essential skills for effective red team operations and enhance your cybersecurity knowledge through this in-depth, hands-on guide.

Red Team Recon Techniques - Red Team Series

Linode
Add to list
0:00 / 0:00