Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Look Ma No Exploits - The Recon-ng Framework

via YouTube

Overview

Explore the Recon-ng Framework in this comprehensive conference talk from DerbyCon 3.0. Dive into advanced reconnaissance techniques, learning about UI highlights, interactive commands, smart loading, and workspaces. Discover methodologies for host harvesting, brute force DNS, and reverse IP lookups. Examine serverside enumeration, vulnerability discovery, and port scanning. Gain insights into social engineering tactics, data manipulation, and expanding datasets. Learn about building contacts, credential checking, and reporting. Enhance your cybersecurity skills with practical demonstrations and expert guidance on leveraging this powerful reconnaissance tool.

Syllabus

Intro
Who am I
Who are you
Disclaimer
The Year of Recon
Traditional Recon
Advanced Recon
Time
caveats
Recon Ng Framework
UI Highlights
Interactive Commands
Smart Loading
Workspaces
Bug Report
Methodology
Host Harvesting
Brute Force DNS
NetCraft Demo
Host Data
Resolving Host Names
Reverse IP Lookup
Filters
Geolocation
View Host
Serverside Enumeration
Vulnerability Discovery
FBI
Hyperion
Port Scan
Gathering Contacts
Data Manipulation
Social Engineering
Logic of Loss
Expanding Data
Building Contacts
FBIgov
Load Who
First Name
Last Name
NameMangle
NameCheck
Credentials
Demo
LeakedDB
Pushpin
Discovery
Reporting
Thank you

Reviews

Start your review of Look Ma No Exploits - The Recon-ng Framework

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.