Overview
Syllabus
Intro
Who am I
Who are you
Disclaimer
The Year of Recon
Traditional Recon
Advanced Recon
Time
caveats
Recon Ng Framework
UI Highlights
Interactive Commands
Smart Loading
Workspaces
Bug Report
Methodology
Host Harvesting
Brute Force DNS
NetCraft Demo
Host Data
Resolving Host Names
Reverse IP Lookup
Filters
Geolocation
View Host
Serverside Enumeration
Vulnerability Discovery
FBI
Hyperion
Port Scan
Gathering Contacts
Data Manipulation
Social Engineering
Logic of Loss
Expanding Data
Building Contacts
FBIgov
Load Who
First Name
Last Name
NameMangle
NameCheck
Credentials
Demo
LeakedDB
Pushpin
Discovery
Reporting
Thank you