Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Recon ng and Beyond - Tim Tomes

via YouTube

Overview

This course covers the following learning outcomes and goals: understanding the concepts of Recon-ng, differentiating between Whitebox and Blackbox testing, utilizing various modules and tools for reconnaissance, conducting vulnerability scanning, searching for sensitive information, and applying advanced Google hacking techniques. The course teaches individual skills such as using Recon-ng for information gathering, conducting static vulnerability scanning, utilizing advanced Google search operators, scraping Google for data, and leveraging the Google Hacking Database for security testing. The teaching method of the course involves video tutorials from BSides Augusta 2015, covering topics such as Recon-ng, vulnerability scanning, and Google hacking techniques. The intended audience for this course includes cybersecurity professionals, ethical hackers, penetration testers, security analysts, and anyone interested in learning advanced reconnaissance and vulnerability assessment techniques.

Syllabus

Intro
Disclaimer
Recon ng
Whitebox vs Blackbox
Overview
Context
Modules
Meta Crawler
Extract
Profiles
Profiler
breeches
Technology
Job postings
Vulnerability
Vulnerability Scanning
Static Vulnerability Scanning
Search Code Search
Github Google Advanced Search
Google GitHub Dorks
Sensitive Information
Scrape Google
Google Hacking Database
Final Thoughts
Bloopers

Reviews

Start your review of Recon ng and Beyond - Tim Tomes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.