Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Reconnaissance
YouTube
education
Showing:
108
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Bugbounty Hunting
2
rewiews
Comprehensive guide to bug bounty hunting, covering tools, techniques, and vulnerabilities for ethical hacking and cybersecurity enthusiasts.
Add to list
35
Lesons
7 hours
On-Demand
Free-Video
Beginner Bug Bounty Course - Web Application Hacking
0
rewiews
Learn web application hacking and bug bounty hunting techniques, from basic recon to advanced exploits like SQL injection and XSS, using popular tools and platforms for hands-on practice.
Add to list
11
Lesons
4 hours 52 minutes
On-Demand
Free-Video
Cyber Mentor
Five Phases of Hacking + Passive OSINT
0
rewiews
Comprehensive guide to passive reconnaissance techniques and OSINT tools for ethical hacking, covering various methods to gather intelligence without direct interaction with target systems.
Add to list
17
Lesons
3 hours 4 minutes
On-Demand
Free-Video
Bug Bounty Methodology
0
rewiews
Learn comprehensive bug bounty techniques, from reconnaissance to vulnerability discovery, with practical tips for successful ethical hacking and reporting security flaws in web applications.
Add to list
28
Lesons
6 hours
On-Demand
Free-Video
INFOSEC TRAIN
Masterclass on Advanced Penetration Testing - Ethical Hacking Lifecycle
0
rewiews
Comprehensive overview of advanced penetration testing techniques, covering exploit frameworks, zero-day vulnerabilities, and macro usage for ethical hacking and cybersecurity professionals.
Add to list
9
Lesons
1 hour 28 minutes
On-Demand
Free-Video
Bug Bounty - Bugs and POC
0
rewiews
Explore bug bounty techniques including recon, subdomain enumeration, XSS, clickjacking, file vulnerabilities, CORS, SQL injection, and LFI. Learn to identify and exploit web security flaws.
Add to list
12
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Ekoparty Security Conference
RedTeaming from Basics - Employee Information Leaks for the Win
0
rewiews
Metodología de reconocimiento en RedTeam: desde el dominio hasta la red interna. Enfoque ofensivo para identificar vectores de ataque y obtener información pública de empleados y empresas.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Bug Bounty Recon Techniques - Ekoparty Summer Workshop 2024
0
rewiews
Aprende técnicas avanzadas de reconocimiento para Bug Bounty con expertos en seguridad. Descubre estrategias efectivas para identificar vulnerabilidades y maximizar tus recompensas.
Add to list
1
Lesons
2 hours 7 minutes
On-Demand
Free-Video
NahamSec
Asset Discovery Using Shodan
0
rewiews
Explore asset discovery techniques using Shodan for bug bounty reconnaissance. Learn effective strategies to uncover vulnerabilities and expand your target scope.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Bugcrowd
How to Crush Bug Bounties in the First 12 Months
0
rewiews
Comprehensive roadmap for new bug bounty hunters: boost knowledge, improve workflow, and achieve success in the first year. Tips for seasoned hackers included.
Add to list
14
Lesons
1 hour 36 minutes
On-Demand
Free-Video
NahamSec
Bug Bounty Recon Basics - Part 1
0
rewiews
Learn essential bug bounty reconnaissance techniques, including subfinder, Google dorking, data manipulation, ASN analysis, Shodan basics, and more for effective vulnerability discovery.
Add to list
14
Lesons
1 hour 30 minutes
On-Demand
Free-Video
NahamSec
Hacking, Recon, and Breaking Into Cybersecurity - A Conversation with Lilly
0
rewiews
Insightful interview with @seclilc on her cybersecurity journey, covering hacking, reconnaissance, tools, work-life balance, and overcoming challenges in the field.
Add to list
20
Lesons
1 hour 24 minutes
On-Demand
Free-Video
NahamSec
Hacking, Content Creation, and API Security with TheXSSRat
0
rewiews
Insightful discussion on hacking, content creation, and API security with TheXSSRat. Covers career paths, learning strategies, and practical tips for aspiring cybersecurity professionals.
Add to list
28
Lesons
1 hour 15 minutes
On-Demand
Free-Video
NahamSec
The Truth About Recon - Bug Bounty Tips
0
rewiews
Discover 7 essential tips for effective recon in bug bounty hunting, including automation, data analysis, and learning from others to improve your cybersecurity skills.
Add to list
8
Lesons
10 minutes
On-Demand
Free-Video
NahamSec
Recon Sunday with Top HackerOne Paid Hackers - Dawgyg, Mayonaise, and cdl
0
rewiews
Live hacking event featuring top-paid hackers Dawgyg, Mayonaise, and cdl discussing reconnaissance techniques and strategies for bug bounty hunting on HackerOne's platform.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
NahamSec
VirSecCon 2020 - Cybersecurity Conference on Bug Bounty, Mobile, Web, and Reconnaissance
0
rewiews
Comprehensive cybersecurity conference featuring expert talks on bug bounty, mobile security, web hacking, and reconnaissance. Gain insights from industry leaders and enhance your ethical hacking skills.
Add to list
13
Lesons
6 hours 59 minutes
On-Demand
Free-Video
NahamSec
Introduction to Web Hacking - OWASP Juice Shop
0
rewiews
Comprehensive introduction to web hacking using OWASP Juice Shop, covering essential techniques and vulnerabilities for aspiring ethical hackers and security enthusiasts.
Add to list
1
Lesons
2 hours 49 minutes
On-Demand
Free-Video
NahamSec
Bug Bounty Techniques: Recon, JavaScript Analysis, and Web Security Tools
0
rewiews
Insightful discussion on bug bounty techniques, covering recon, JavaScript analysis, WAF bypassing, and utilizing the Wayback Machine for effective vulnerability discovery.
Add to list
1
Lesons
2 hours 10 minutes
On-Demand
Free-Video
NahamSec
Recon Methodology for Consistent High-Value Bug Bounties - Interview with Th3G3nt3lman
0
rewiews
Discover effective recon methodologies for high-value bug bounties. Learn from @Th3G3nt3lman's experience in GitHub reconnaissance, tool usage, and collaboration strategies for successful hacking.
Add to list
17
Lesons
2 hours 19 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo.com - Subdomain Enumeration Techniques
0
rewiews
Live bug bounty recon session exploring Verizon Media's Yahoo.com with @Securinti. Learn subdomain enumeration techniques, create a Recondb, and gain insights into effective reconnaissance strategies for ethical hacking.
Add to list
1
Lesons
3 hours 18 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session - Creating a Recon Database for Yahoo
0
rewiews
Live session on bug bounty reconnaissance techniques and building a recon database for Yahoo, featuring guest @Daeken. Learn effective strategies for subdomain enumeration using multiple tools to enhance your bug hunting skills.
Add to list
1
Lesons
1 hour 29 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools
0
rewiews
Live bug bounty recon session demonstrating tools and techniques for reconnaissance on Yahoo, featuring guest @Tomnomnom. Covers creating wordlists, using meg and assetfinder, directory brute forcing, and crt.sh.
Add to list
1
Lesons
1 hour 47 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Censys, Crtsh, Sublist3r
0
rewiews
Live bug bounty recon session demonstrating techniques and tools for discovering vulnerabilities on Yahoo's domains, featuring guest @Yaworsk and covering Censys, Crt.sh, Sublist3r, and other reconnaissance methods.
Add to list
1
Lesons
3 hours 30 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Censys, Altdns, Amass
0
rewiews
Live bug bounty recon session exploring Yahoo using tools like censys, altdns, and amass. Learn techniques for subdomain discovery, directory brute forcing, and more with guest @infosec_au.
Add to list
1
Lesons
3 hours 22 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Amass, crt.sh, and Dirsearch
0
rewiews
Live bug bounty recon session demonstrating advanced techniques for discovering vulnerabilities on Yahoo, featuring tools like Amass, crt.sh, and dirsearch, with guest expert @TheDawgyg.
Add to list
1
Lesons
3 hours 10 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session - August 18, 2019
0
rewiews
Live bug bounty recon session covering techniques like JSParser, directory brute forcing, crt.sh, and API fuzzing. Expert guests share insights on effective reconnaissance strategies for ethical hacking.
Add to list
1
Lesons
2 hours 43 minutes
On-Demand
Free-Video
NahamSec
Live Recon on Rockstar Games - Vulnerability Testing Methodology
0
rewiews
zseano demonstrates vulnerability testing methodologies on Rockstar Games, showcasing tools like Burp Suite and techniques for identifying XSS and open redirects in this live recon session.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
NahamSec
Recon Methodology Using SecurityTrails, FDNS, Whoxy, and More
0
rewiews
Explore codingo_'s unique recon methodology for ethical hacking, featuring tools like SecurityTrails, FDNS, and Whoxy to enhance your cybersecurity skills and bug bounty hunting techniques.
Add to list
1
Lesons
1 hour 33 minutes
On-Demand
Free-Video
NahamSec
Live Recon and Distributed Recon Automation Using Axiom
0
rewiews
Explore live recon and distributed recon automation using Axiom with @pry0cc. Learn advanced techniques for efficient and effective bug bounty hunting and cybersecurity research.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
NahamSec
Live Recon and Automation on Shopify's Bug Bounty Program - TomNomNom
0
rewiews
Explore live recon and automation techniques for Shopify's bug bounty program with expert insights, enhancing your skills in identifying vulnerabilities and maximizing bounty rewards.
Add to list
1
Lesons
1 hour 17 minutes
On-Demand
Free-Video
NahamSec
Live Recon and Google Dorking on the Department of Defense Vulnerability Disclosure Program
0
rewiews
Explore live reconnaissance and Google dorking techniques on the Department of Defense's Vulnerability Disclosure Program, featuring insights from @thedawgyg.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
NahamSec
Live Recon on Snapchat - Demonstration of Amass, FFUF, and SecurityTrails
0
rewiews
Explore live reconnaissance techniques on Snapchat using tools like amass, FFUF, and SecurityTrails in this hands-on demonstration with @ITSecurityGuard.
Add to list
1
Lesons
1 hour 42 minutes
On-Demand
Free-Video
NahamSec
Bug Bounty Seminar with Verizon Media's Paranoids
0
rewiews
Explore bug bounty hunting with Verizon Media's Paranoids team. Learn strategies, techniques, and insights to enhance your cybersecurity skills and potentially earn rewards.
Add to list
1
Lesons
2 hours 3 minutes
On-Demand
Free-Video
NahamSec
Getting Into Bug Bounty - Recon, Automation, and Triage
0
rewiews
Explore bug bounty hunting with insights on reconnaissance, automation, and triage from @ITSecurityguard. Learn key strategies for success in this cybersecurity field.
Add to list
1
Lesons
1 hour 15 minutes
On-Demand
Free-Video
Cyber Mentor
A Day in the Life of an Ethical Hacker - 2022 Edition
0
rewiews
Experience a day as an ethical hacker: explore cybersecurity tasks, tools, and techniques used to identify vulnerabilities and strengthen digital defenses in this insightful video.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Cyber Mentor
Automating Recon with Bash Scripting
0
rewiews
Learn to automate reconnaissance tasks using Bash scripting, enhancing efficiency in ethical hacking. Covers tools like Sublist3r, httprobe, nmap, and Eyewitness for streamlined information gathering.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for Beginners - Episode 8: Bashed (HackTheBox)
0
rewiews
Learn ethical hacking techniques through a hands-on walkthrough of the "Bashed" challenge on HackTheBox, focusing on penetration testing skills for beginners.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
LASCON
Hacking and Defending APIs - Red and Blue Make Purple
0
rewiews
Comprehensive guide to API security: attack techniques, defense strategies, and best practices for both testers and defenders. Covers BOLA, authentication, data exposure, and more.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Social Engineer Your Students Before They Social Engineer You
0
rewiews
Learn techniques to teach social engineering in cybersecurity, covering human factors, psychology, and defense against human vulnerabilities. Gain insights on incorporating this crucial topic into curriculum effectively.
Add to list
11
Lesons
28 minutes
On-Demand
Free-Video
John Hammond
How to Pivot Through a Network with Chisel
0
rewiews
Learn to pivot through networks using Chisel, covering setup, reconnaissance, static binaries, reverse connections, SOCKS proxies, and forward shells for effective network penetration.
Add to list
11
Lesons
34 minutes
On-Demand
Free-Video
OSInt, Cyberstalking, Footprinting and Recon: Getting to Know You - Part 3 Metadata and Miscellaneous Topics
0
rewiews
Explore metadata, file formats, and EXIF information for effective digital footprinting and reconnaissance. Learn practical tools and techniques for gathering valuable intelligence.
Add to list
15
Lesons
1 hour
On-Demand
Free-Video
OWASP Foundation
Automated Security Testing With OWASP Nettacker
0
rewiews
Learn automated security testing techniques using OWASP Nettacker, a powerful open-source tool for vulnerability assessment and information gathering in web applications and networks.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Linux Foundation
reNgine - An Automated Reconnaissance Framework
0
rewiews
Explore an automated reconnaissance framework for efficient cybersecurity assessments, enhancing vulnerability detection and streamlining security workflows.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
HackerSploit
Information Gathering With Shodan
0
rewiews
Demonstración práctica del uso de Shodan para recopilación de información y reconocimiento en pruebas de penetración, explorando sus filtros y capacidades de búsqueda de dispositivos conectados a Internet.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
HackerSploit
HackTheBox Arctic Machine Walkthrough
0
rewiews
Comprehensive walkthrough for successfully exploiting the Arctic machine on HackTheBox, demonstrating penetration testing techniques and vulnerability exploitation in a controlled environment.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
HackerSploit
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
0
rewiews
Comprehensive walkthrough of Raven1 CTF challenge from VulnHub, demonstrating boot-to-root exploitation techniques for ethical hacking and penetration testing practice.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
SANS
Ghost in Your Supply Chain - APT Attacks on Taiwan's Financial Sector
0
rewiews
Explore APT attacks on Taiwan's financial sector, focusing on supply chain vulnerabilities. Learn about MDM platform exploitation, JIRA abuse, and malware-free attacks. Gain insights into island-hopping techniques and comprehensive threat mapping.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Snyk
How AI Impacts Reconnaissance and Bug Bounties in Cybersecurity
0
rewiews
Exploring AI's impact on cybersecurity, this interview covers its role in bug bounties, potential risks, job market effects, and defensive strategies against malicious AI use.
Add to list
14
Lesons
27 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Certified Ethical Hacker (CEH) Exam Prep - Step-by-Step Breakdown to Certification - Day 1
0
rewiews
Master ethical hacking skills and prepare for CEH certification with a comprehensive overview, key domain practice, and exam strategies. Gain insights into reconnaissance, scanning, and web application hacking.
Add to list
1
Lesons
1 hour 43 minutes
On-Demand
Free-Video
Bugcrowd
New Methods of Recon - Enhancing Reconnaissance Techniques
0
rewiews
Refine and expand your reconnaissance toolkit with top hacker OrwaGodfather's precise tactics, enhancing your bug hunting capabilities.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Certified Ethical Hacker (CEH) Exam Prep - Step-by-Step Breakdown to Certification - Day 2
0
rewiews
Master ethical hacking techniques, explore key domains, and prepare for the CEH exam with hands-on exercises, real-world scenarios, and expert guidance. Enhance your cybersecurity skills and career prospects.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Bugcrowd
How to Build a Secure Recon Network Using Tailscale
0
rewiews
Build a secure recon network with Tailscale to protect your offensive tools, safeguard data, and enhance your bounty hunting capabilities.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
HackerSploit
Active Directory Enumeration with BloodHound
0
rewiews
Automate and visualize Active Directory enumeration using BloodHound. Learn to streamline the process of identifying vulnerabilities and attack paths in AD environments.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Beginner to Advanced Bug Bounty Hunting Course - 2022
0
rewiews
Comprehensive ethical hacking course covering web application vulnerabilities, penetration testing techniques, and programming skills for aspiring bug bounty hunters and security professionals.
Add to list
21
Lesons
11 hours 20 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Pivoting and Exploitation in Docker Environment
0
rewiews
Demostración de técnicas de pivoting, explotación y escalada de privilegios en entornos Docker con múltiples redes. Incluye metodologías de pentest y superación de obstáculos en diferentes configuraciones de red.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Lemon Booster - Automatizando desde la UI
0
rewiews
Automatización del reconocimiento en programas de Bug Bounty con Lemon Booster: herramienta con interfaz visual para ejecutar, analizar y monitorear resultados, agilizando el proceso de búsqueda de vulnerabilidades.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Ekoparty Security Conference
MagicRecon - Bug Bounty Space
0
rewiews
Exploración de MagicRecon, una herramienta para recolección de datos y búsqueda de vulnerabilidades en pentesting y Bug Bounty. Enfoque en la importancia de la fase de reconocimiento en hacking ético.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Hack in Paris
No Win32_Process Needed - Expanding the WMI Lateral Movement Arsenal
0
rewiews
Explore advanced WMI lateral movement techniques beyond Win32_Process, expanding the arsenal for threat actors and enhancing defensive strategies against sophisticated attacks.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Hack in Paris
I Know What Your Microsoft Mainframe Did Last Summer
0
rewiews
Explore Active Directory forensics, lateral movement, and reconnaissance techniques. Learn to hunt for clues without AD logs using open-source tools in this hands-on session with real-world incident insights.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
BSidesLV
Exploiting Windows Group Policy for Reconnaissance and Attack
0
rewiews
Explore Windows Group Policy vulnerabilities, reconnaissance techniques, and attack paths. Learn defensive strategies to protect against Group Policy exploitation.
Add to list
15
Lesons
55 minutes
On-Demand
Free-Video
BSidesLV
Prisoner Number Six
0
rewiews
Explore Docker container escape techniques through live demonstrations, covering reconnaissance, exploiting vulnerabilities, and gaining system access. Learn practical cybersecurity skills for container environments.
Add to list
19
Lesons
52 minutes
On-Demand
Free-Video
Cooper
ReconPi
0
rewiews
Explore ReconPi, a tool for efficient reconnaissance in cybersecurity, with insights on its inspiration, functionality, and practical applications.
Add to list
16
Lesons
25 minutes
On-Demand
Free-Video
DefCamp
Web Application Firewall Bypassing - DefCamp - 2016
0
rewiews
Aprende técnicas avanzadas para evadir firewalls de aplicaciones web, incluyendo métodos de reconocimiento, explotación de discrepancias y bypass de reglas para pruebas de penetración efectivas.
Add to list
13
Lesons
48 minutes
On-Demand
Free-Video
DefCamp
Breaking in Bad - I'm the One Who Doesn't Knock - DefCamp - 2015
0
rewiews
Exploración práctica de técnicas de hacking y seguridad informática, destacando vulnerabilidades comunes y la importancia de la concienciación en ciberseguridad.
Add to list
89
Lesons
1 hour 1 minute
On-Demand
Free-Video
Security BSides London
How I Break Into Casinos, Airports and CNI - The Basics of Social Engineering
0
rewiews
Discover the art of social engineering for ethical hacking. Learn reconnaissance, disguise, pretext creation, and interaction techniques to infiltrate secure facilities while maintaining professionalism and ethics.
Add to list
14
Lesons
31 minutes
On-Demand
Free-Video
Security BSides San Francisco
Assessing the Embedded Devices On Your Network
0
rewiews
Explore embedded device security challenges, threat modeling, and assessment techniques through a VoIP phone case study. Learn hardware tricks, debugging methods, and potential mitigations for vulnerabilities.
Add to list
12
Lesons
34 minutes
On-Demand
Free-Video
Pen Test War Stories - Why My Job Is So Easy and How You Can Make It Harder
0
rewiews
Discover common penetration testing vulnerabilities and learn effective remediation strategies to enhance your organization's cybersecurity posture.
Add to list
25
Lesons
49 minutes
On-Demand
Free-Video
How to Hunt for Lateral Movement on Your Network
0
rewiews
Learn techniques to detect and analyze lateral movement in network security, covering reconnaissance, privilege escalation, and credential theft, with practical datasets for effective monitoring.
Add to list
13
Lesons
46 minutes
On-Demand
Free-Video
RSA Conference
Building a Comprehensive IoT Security Testing Methodology
0
rewiews
Comprehensive methodology for IoT security testing, covering functional evaluation, reconnaissance, testing phases for various components, and analysis. Equips testers with skills for enterprise and consumer IoT ecosystems.
Add to list
19
Lesons
53 minutes
On-Demand
Free-Video
RSA Conference
Abaddon - The Red Team Angel
0
rewiews
Explore advanced red team operations management with Abaddon, a software designed to enhance efficiency, stealth, and reporting capabilities in complex security assessments.
Add to list
15
Lesons
31 minutes
On-Demand
Free-Video
What I Know About Your Company OSINT and Hacking LinkedIn Business Processes
0
rewiews
Discover advanced OSINT techniques for LinkedIn, including reconnaissance, scripting, and exploiting vulnerabilities. Learn to gather valuable business intelligence ethically and securely.
Add to list
24
Lesons
36 minutes
On-Demand
Free-Video
Red Teaming Back and Forth 5ever
0
rewiews
Explore red teaming strategies, reconnaissance techniques, and unconventional approaches to penetration testing in this humorous and informative cybersecurity talk.
Add to list
20
Lesons
54 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
In Depth Analysis of Multicast DNS and DNS Service Discovery
0
rewiews
Análisis profundo de los protocolos mDNS y DNS-SD, explorando sus vulnerabilidades inherentes y posibles vectores de ataque en entornos de red de configuración cero.
Add to list
41
Lesons
44 minutes
On-Demand
Free-Video
Kaspersky
Operation V-Neptun
0
rewiews
Explore a Cold War disinformation campaign in Czechoslovakia and its relevance to modern fake news, with insights from strategic studies expert Thomas Rid.
Add to list
14
Lesons
25 minutes
On-Demand
Free-Video
Black Hat
It's Not Finished - The Evolving Maturity in Ransomware Operations
0
rewiews
Explore the evolving sophistication of ransomware operations, focusing on European targets, attack strategies, and the lifecycle of Rival ransomware. Learn about emerging trends and future threats in cybersecurity.
Add to list
21
Lesons
36 minutes
On-Demand
Free-Video
HackerOne
The Bug Hunter's Methodology v4 - Recon Edition
0
rewiews
Explore cutting-edge techniques for bug hunters and red teamers to discover and expand attack surfaces, focusing on domain reconnaissance, subdomain enumeration, and IP space analysis.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
Break Me07 Phishing - Going from Recon to Creds
0
rewiews
Comprehensive guide to phishing attacks: from initial reconnaissance to obtaining credentials, presented by cybersecurity experts Adam Compton and Eric Gershman at DerbyCon 2015.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Security BSides London
Introduction to Bug Hunting
0
rewiews
Learn essential techniques and strategies for identifying and reporting software vulnerabilities, enhancing your skills in ethical hacking and cybersecurity.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
NahamSec
How to Use Amass Efficiently
0
rewiews
Comprehensive guide on maximizing Amass tool for efficient information gathering and reconnaissance in cybersecurity, presented by expert Jeff Foley at NahamCon2020.
Add to list
1
Lesons
1 hour 56 minutes
On-Demand
Free-Video
NahamSec
Recon Fundamentals by Example
0
rewiews
Explore recon fundamentals through practical examples in this offensive security talk. Learn essential techniques for effective reconnaissance in bug bounty and penetration testing.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
NahamSec
Putting Your Mind to It - Bug Bounties for 12 Months
0
rewiews
Insights into successful bug bounty hunting strategies and experiences over a 12-month period, focusing on mindset, persistence, and effective techniques for finding vulnerabilities.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
NahamSec
Learn to Hack - Choose a Target - Get a Bounty
0
rewiews
Practical guide to overcoming initial challenges in bug bounty hunting, covering automation, reconnaissance, common vulnerabilities, and essential hacking skills for beginners.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
HackerOne
Hacking on Bug Bounties for Five Years
0
rewiews
Discover the evolution of bug bounty hunting over five years, exploring successful techniques, favorite vulnerabilities, and lessons learned to help you replicate success in ethical hacking.
Add to list
33
Lesons
46 minutes
On-Demand
Free-Video
NahamSec
Attacking Wide Scopes
0
rewiews
Explore techniques for attacking wide-scope targets in bug bounty programs. Learn strategies to identify vulnerabilities and maximize your impact when dealing with extensive attack surfaces.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
HackerOne
The Bug Hunter's Methodology - Application Analysis
0
rewiews
Discover advanced techniques for application analysis in bug hunting with insights from a top-ranked researcher. Learn recon strategies and web app vulnerabilities to enhance your ethical hacking skills.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
BSidesLV
Phishing - Going From Recon to Credentials
0
rewiews
Learn effective phishing techniques, from reconnaissance to credential harvesting. Explore tools, automation, and the Speed Fishing Framework in this comprehensive overview.
Add to list
19
Lesons
27 minutes
On-Demand
Free-Video
Security BSides London
Introduction to Red Team Tooling and Opsec
0
rewiews
Explore modern red team techniques, tools, and operational security practices for effective penetration testing and cybersecurity assessments.
Add to list
7
Lesons
12 minutes
On-Demand
Free-Video
BSidesLV
ATGP - Intro For New WCTFers
0
rewiews
Explore wireless capture techniques, legal considerations, and essential tools for effective signal reconnaissance and analysis in this comprehensive introduction.
Add to list
24
Lesons
1 hour 6 minutes
On-Demand
Free-Video
Red Team Yourself - Thomas Richards
0
rewiews
Learn to assess your organization's security through red teaming techniques. Discover threat actors, asset protection, and engagement strategies for comprehensive security program improvement.
Add to list
20
Lesons
48 minutes
On-Demand
Free-Video
44CON Information Security Conference
The Art of the Breach
0
rewiews
Comprehensive guide to physical security breaching, from reconnaissance to exit strategies. Explores various entry methods, overcoming obstacles, and combining infosec with first responder techniques.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
How to Give the Best Pen Test of Your Life
0
rewiews
Discover strategies for conducting exceptional penetration tests, enhancing your skills and delivering valuable results to clients. Learn from expert Ed Skoudis's insights and techniques.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
OSINT for AppSec Recon ng and Beyond - Tim Tomes
0
rewiews
Explore OSINT techniques for AppSec reconnaissance using Recon-ng, covering data extraction, vulnerability scanning, and leveraging online resources for effective security assessments.
Add to list
24
Lesons
51 minutes
On-Demand
Free-Video
Forging Your Identity - Credibility Beyond Words
0
rewiews
Explore identity credibility in physical security assessments, covering reconnaissance, tools, and strategies for successful penetration testing and safe exit.
Add to list
8
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Attackers Perspective - A Technical Demonstration of an Email Phishing Attack
0
rewiews
Explore email phishing attacks from an attacker's perspective, covering reconnaissance, tools, payload delivery, and network enumeration techniques for improved cybersecurity awareness.
Add to list
16
Lesons
44 minutes
On-Demand
Free-Video
Red Team Yourself - Thomas Richards
0
rewiews
Learn adversary emulation techniques, build an in-house red team, and master reconnaissance and attack planning for comprehensive security assessments.
Add to list
29
Lesons
46 minutes
On-Demand
Free-Video
Full Contact Recon
0
rewiews
Explore advanced reconnaissance techniques with int0x80 of Dual Core, focusing on innovative methods for gathering intelligence and enhancing cybersecurity strategies.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Red Team Yourself - Thomas Richards
0
rewiews
Learn to emulate adversaries, conduct comprehensive security assessments, and build an effective in-house red team. Explore reconnaissance, attack planning, and post-exploitation techniques for robust cybersecurity.
Add to list
29
Lesons
43 minutes
On-Demand
Free-Video
Recon Village
Finding Hidden Gems in Temporary Mail Services - Monitoring and Security Analysis
0
rewiews
Discover how to monitor temporary email services using a Python tool to uncover valuable information, from account credentials to bitcoin wallets, while learning about security implications and red team activities.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
DEFCONConference
Physical OSINT: Finding and Investigating Facilities Using Open Source Intelligence
0
rewiews
Discover essential physical OSINT techniques and tools for gathering intelligence, from basic social media searches to advanced facility reconnaissance and data collection methods.
Add to list
9
Lesons
16 minutes
On-Demand
Free-Video
BSidesMunich
Let Me Do It For You: Automating OSINT and Recon
0
rewiews
Discover effective strategies for automating OSINT and reconnaissance processes to streamline cybersecurity investigations and threat intelligence gathering.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
load more...