Главная
Study mode:
on
1
Intro
2
Disclaimer
3
Recon ng
4
Whitebox vs Blackbox
5
Overview
6
Context
7
Modules
8
Meta Crawler
9
Extract
10
Profiles
11
Profiler
12
breeches
13
Technology
14
Job postings
15
Vulnerability
16
Vulnerability Scanning
17
Static Vulnerability Scanning
18
Search Code Search
19
Github Google Advanced Search
20
Google GitHub Dorks
21
Sensitive Information
22
Scrape Google
23
Google Hacking Database
24
Final Thoughts
25
Bloopers
Description:
Explore advanced reconnaissance techniques in this 58-minute conference talk from BSides Augusta 2015. Dive into the world of Recon-ng and beyond as Tim Tomes discusses whitebox vs blackbox approaches, meta crawling, profile extraction, and vulnerability scanning. Learn about leveraging job postings and technology profiles for information gathering, and discover effective methods for searching code repositories and utilizing Google dorks. Gain insights into scraping Google results and using the Google Hacking Database for uncovering sensitive information. Enhance your cybersecurity skills with practical knowledge on conducting thorough reconnaissance and identifying potential vulnerabilities.

Recon ng and Beyond - Tim Tomes

Add to list