Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Shodan
YouTube
education
Showing:
13
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Basic to Advance Kali Linux Web Penetration Testing
12
rewiews
Understand the tools and the methodologies used to get an overview of Web Penetration Testing using Kali Linux.
Add to list
5
Lesons
30 minutes
On-Demand
Free-Video
HackerSploit
OSINT
1
rewiews
Explore DNS enumeration, automated information gathering with Maltego, and leveraging Shodan for accessing routers, servers, and webcams in this comprehensive OSINT tutorial.
Add to list
4
Lesons
1 hour 30 minutes
On-Demand
Free-Video
HackerSploit
Shodan Search Engine Tutorial - Access Routers, Servers, Webcams + Install CLI
0
rewiews
Explore Shodan's capabilities to find internet-connected devices, from webcams to routers. Learn search techniques, filters, and CLI installation for enhanced cybersecurity awareness.
Add to list
10
Lesons
22 minutes
On-Demand
Free-Video
NahamSec
Asset Discovery Using Shodan
0
rewiews
Explore asset discovery techniques using Shodan for bug bounty reconnaissance. Learn effective strategies to uncover vulnerabilities and expand your target scope.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
NahamSec
Bug Bounty Recon Basics - Part 1
0
rewiews
Learn essential bug bounty reconnaissance techniques, including subfinder, Google dorking, data manipulation, ASN analysis, Shodan basics, and more for effective vulnerability discovery.
Add to list
14
Lesons
1 hour 30 minutes
On-Demand
Free-Video
NahamSec
OSCP, Deserialization Bugs, Shodan Tips, and Becoming an MVH - Interview with SMSecurity
0
rewiews
Insightful discussion on OSCP certification, deserialization vulnerabilities, Shodan techniques, and achieving Most Valuable Hacker status, offering valuable insights for aspiring cybersecurity professionals.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Inside the World's Most Dangerous Search Engine - Shodan
0
rewiews
Explore the inner workings and potential risks of a powerful search engine with insights from its creator, delving into cybersecurity implications and technological advancements.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
HackerSploit
Information Gathering With Shodan
0
rewiews
Demonstración práctica del uso de Shodan para recopilación de información y reconocimiento en pruebas de penetración, explorando sus filtros y capacidades de búsqueda de dispositivos conectados a Internet.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Cooper
Applying Bug Hunters Methodologies to Your Organization - Lessons from the Field
0
rewiews
Discover how to apply bug bounty techniques within your organization for enhanced security. Learn to extract and utilize information from various sources to identify vulnerabilities proactively.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Devoxx
Batshit Stupid Things You Can Put on the Internet in as Fast as I Can Go
0
rewiews
Explore shocking internet security oversights with Dan Tentler as he reveals 115 absurd findings from scanning the web, highlighting the critical need for better cybersecurity practices.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
NahamSec
The Power of Shodan - Leveraging Shodan for Critical Vulnerabilities
0
rewiews
Explore Shodan's capabilities for identifying critical vulnerabilities in systems. Learn effective techniques to leverage this powerful search engine for enhanced cybersecurity and vulnerability assessment.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
So You've Inherited a Security Department - Now What
0
rewiews
Practical strategies for new security department leaders: asset management, information gathering, vulnerability assessment, and team building for effective cybersecurity operations.
Add to list
20
Lesons
38 minutes
On-Demand
Free-Video
Recon Village
Getting Ahead of the Bad Guys with Internet Scanning Data
0
rewiews
Discover how to leverage internet scanning services like Shodan and BinaryEdge to identify adversarial infrastructure, detect threats early, and enhance defensive capabilities through practical hunting techniques and real-world examples.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
load more...