Look Ma No Exploits - The Recon-ng Framework

Look Ma No Exploits - The Recon-ng Framework

via YouTube Direct link

NameMangle

41 of 49

41 of 49

NameMangle

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Look Ma No Exploits - The Recon-ng Framework

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who am I
  3. 3 Who are you
  4. 4 Disclaimer
  5. 5 The Year of Recon
  6. 6 Traditional Recon
  7. 7 Advanced Recon
  8. 8 Time
  9. 9 caveats
  10. 10 Recon Ng Framework
  11. 11 UI Highlights
  12. 12 Interactive Commands
  13. 13 Smart Loading
  14. 14 Workspaces
  15. 15 Bug Report
  16. 16 Methodology
  17. 17 Host Harvesting
  18. 18 Brute Force DNS
  19. 19 NetCraft Demo
  20. 20 Host Data
  21. 21 Resolving Host Names
  22. 22 Reverse IP Lookup
  23. 23 Filters
  24. 24 Geolocation
  25. 25 View Host
  26. 26 Serverside Enumeration
  27. 27 Vulnerability Discovery
  28. 28 FBI
  29. 29 Hyperion
  30. 30 Port Scan
  31. 31 Gathering Contacts
  32. 32 Data Manipulation
  33. 33 Social Engineering
  34. 34 Logic of Loss
  35. 35 Expanding Data
  36. 36 Building Contacts
  37. 37 FBIgov
  38. 38 Load Who
  39. 39 First Name
  40. 40 Last Name
  41. 41 NameMangle
  42. 42 NameCheck
  43. 43 Credentials
  44. 44 Demo
  45. 45 LeakedDB
  46. 46 Pushpin
  47. 47 Discovery
  48. 48 Reporting
  49. 49 Thank you

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.