Overview
This course covers the following learning outcomes and goals: understanding the concepts of Recon-ng, differentiating between Whitebox and Blackbox testing, utilizing various modules and tools for reconnaissance, conducting vulnerability scanning, searching for sensitive information, and applying advanced Google hacking techniques.
The course teaches individual skills such as using Recon-ng for information gathering, conducting static vulnerability scanning, utilizing advanced Google search operators, scraping Google for data, and leveraging the Google Hacking Database for security testing.
The teaching method of the course involves video tutorials from BSides Augusta 2015, covering topics such as Recon-ng, vulnerability scanning, and Google hacking techniques.
The intended audience for this course includes cybersecurity professionals, ethical hackers, penetration testers, security analysts, and anyone interested in learning advanced reconnaissance and vulnerability assessment techniques.
Syllabus
Intro
Disclaimer
Recon ng
Whitebox vs Blackbox
Overview
Context
Modules
Meta Crawler
Extract
Profiles
Profiler
breeches
Technology
Job postings
Vulnerability
Vulnerability Scanning
Static Vulnerability Scanning
Search Code Search
Github Google Advanced Search
Google GitHub Dorks
Sensitive Information
Scrape Google
Google Hacking Database
Final Thoughts
Bloopers