Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Look Ma No Exploits - The Recon-ng Framework

via YouTube

Overview

This course focuses on teaching the Recon Ng Framework for reconnaissance purposes. By the end of the course, learners will be able to conduct traditional and advanced reconnaissance using the framework. They will learn how to utilize interactive commands, workspaces, bug reporting, host harvesting, DNS brute forcing, NetCraft demonstration, geolocation, vulnerability discovery, port scanning, data manipulation, social engineering, and contact gathering. The teaching method includes UI highlights, smart loading, and interactive commands. This course is intended for individuals interested in cybersecurity, ethical hacking, and reconnaissance techniques.

Syllabus

Intro
Who am I
Who are you
Disclaimer
The Year of Recon
Traditional Recon
Advanced Recon
Time
caveats
Recon Ng Framework
UI Highlights
Interactive Commands
Smart Loading
Workspaces
Bug Report
Methodology
Host Harvesting
Brute Force DNS
NetCraft Demo
Host Data
Resolving Host Names
Reverse IP Lookup
Filters
Geolocation
View Host
Serverside Enumeration
Vulnerability Discovery
FBI
Hyperion
Port Scan
Gathering Contacts
Data Manipulation
Social Engineering
Logic of Loss
Expanding Data
Building Contacts
FBIgov
Load Who
First Name
Last Name
NameMangle
NameCheck
Credentials
Demo
LeakedDB
Pushpin
Discovery
Reporting
Thank you

Reviews

Start your review of Look Ma No Exploits - The Recon-ng Framework

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.