Сообщение

[Pluralsight.com] Ethical Hacking: Reconnaissance/Footprinting [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 15:24

Ethical Hacking: Reconnaissance/Footprinting

Год выпуска: 2015
Производитель: Pluralsight
Сайт производителя: pluralsight.com
Автор: Dale Meredith
Продолжительность: 3:28
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: This course is part of the 20 course Ethical Hacking Series. As an Ethical Hacker, you've been asked to do a "Blackbox" attack on a customer's infrastructure. Your first step is finding out as much as you can about the "target." You accomplish this via reconnaissance/footprinting. This is the initial stage in gaining a blueprint of the security profile of a target, and it is accomplished in an organized manner. Reconnaissance is one of the three "pre-attack phases," and results in a unique profile of an organization's networks and systems. "Reconning" an organization is necessary in order to systematically gather all the related data in regards to the technologies deployed within the network. Reconnaissance can take up to 90% of the time during penetration testing or an actual attack. We'll show you how attackers are currently reconning your company, as well as discuss in detail the steps of reconnaissance. Finally we'll look at some possible countermeasures to help discourage attackers.

Очередная часть серии курсов Ethical Hacking.
What Do You Mean by Reconnaissance/Footprinting?
What Do You Mean by Reconnaissance/Footprinting?
Why Recon?
More Reasons Why We Recon
Types of Recon
Goals of Recon
Tools of Recon
Summary

Initially What Do You Look For?
Initially What Do You Look For?
Using Search Engines
Using Websites
Using Whois
Using PING & DNS
Continuing to Use DNS
Some Advanced DNS Tricks
Summary

The More You Look, the More You Find
The More You Look, the More You Find
Job Sites
Social Job Sites
Even More Job Sites
Netcraft
The Wayback Machine
People Search
Summary

Other Reconnaissance Techniques
Other Reconnaissance Techniques
Social Sources
Company: What Can Be Learned?
Facebook
Linkedin
Financial & Competitive Analysis Data
Using Communications to Recon
You've Got Mail Equals I've Got You!
Summary

Reconnaissance via Google Hacking
Reconnaissance via Google Hacking
Understanding Google
The Google Operators
Advanced Google Operators
Using the Operators
Using More Advanced Operators
Applying What You Now Know
The Google Hacking Database
Other Google Hacking Tools
Summary

Reconnaissance Countermeasures & Pen Testing
Reconnaissance Countermeasures & Pen Testing
Countermeasures for Recon
More Countermeasures
Recon Pen Tests
What Should Be on the Report
There's Still More for the Report
Summary
Файлы примеров: присутствуют
Формат видео: MP4
Видео: AVC, 1024x768, 4:3, 15fps, 318kbps
Аудио: AAC, 44.1kHz, 96kbps, stereo

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 15:24
Размер: 500.42 МБ
Размер: 524 729 041 байт
Сидеров: 0
Личеров: 0
Скачали: 0
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: Нет
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 25.05 КБ / Просмотров 0 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность