Главная
Study mode:
on
1
Intro
2
Who am I
3
Who are you
4
Disclaimer
5
The Year of Recon
6
Traditional Recon
7
Advanced Recon
8
Time
9
caveats
10
Recon Ng Framework
11
UI Highlights
12
Interactive Commands
13
Smart Loading
14
Workspaces
15
Bug Report
16
Methodology
17
Host Harvesting
18
Brute Force DNS
19
NetCraft Demo
20
Host Data
21
Resolving Host Names
22
Reverse IP Lookup
23
Filters
24
Geolocation
25
View Host
26
Serverside Enumeration
27
Vulnerability Discovery
28
FBI
29
Hyperion
30
Port Scan
31
Gathering Contacts
32
Data Manipulation
33
Social Engineering
34
Logic of Loss
35
Expanding Data
36
Building Contacts
37
FBIgov
38
Load Who
39
First Name
40
Last Name
41
NameMangle
42
NameCheck
43
Credentials
44
Demo
45
LeakedDB
46
Pushpin
47
Discovery
48
Reporting
49
Thank you
Description:
Explore the Recon-ng Framework in this comprehensive conference talk from DerbyCon 3.0. Dive into advanced reconnaissance techniques, learning about UI highlights, interactive commands, smart loading, and workspaces. Discover methodologies for host harvesting, brute force DNS, and reverse IP lookups. Examine serverside enumeration, vulnerability discovery, and port scanning. Gain insights into social engineering tactics, data manipulation, and expanding datasets. Learn about building contacts, credential checking, and reporting. Enhance your cybersecurity skills with practical demonstrations and expert guidance on leveraging this powerful reconnaissance tool.

Look Ma No Exploits - The Recon-ng Framework

Add to list