This course provides an overview of ReconPi, including its inspiration, examples, visual guides, discovery techniques, cloning, and methodology. The learning outcomes include understanding how to use ReconPi for reconnaissance, identifying blockages, and utilizing word lists. The teaching method is a presentation style, and the intended audience is individuals interested in cybersecurity and reconnaissance techniques.
Overview
Syllabus
Intro
Overview
ReconPi
Inspiration
Example
Blockage
Visual Guide
Discover
Cloning
Pain
Home Source
Word List
Root DNS
IP address
Release date
Methodology
Taught by
Cooper