Overview
Explore advanced reconnaissance techniques in this 57-minute conference talk from BSides Augusta 2015. Dive into Recon-ng, a powerful open-source intelligence gathering tool, and learn how to leverage it for comprehensive assessments. Discover attack patterns, modules, and strategies for extracting credentials and sensitive information. Gain insights into online vulnerability scanners, third-party repositories, and advanced search techniques using Google and Github. Understand the importance of privacy rights and the ethical considerations of information gathering. Enhance your cybersecurity skills with practical demos and expert guidance on utilizing various OSINT resources, including the Google Hacking Database, for effective reconnaissance.
Syllabus
Intro
Who am I
Demos
Recon ng
What is Recon ng
Darker the assessment
Impact
Overview
Attack Patterns
Modules
Reconng
Extract
Credentials
Privacy Rights
NSAgov
Resumes
What am I looking for
Online vulnerability scanners
Thirdparty repositories
Github Bitbucket
Google and Github Advanced Search
Sensitive Information
Google Hacking Database
Final Thoughts
Giveaway