Ethical Hacking: Footprinting and Reconnaissance

Ethical Hacking: Footprinting and Reconnaissance
Ethical Hacking: Footprinting and Reconnaissance

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 31m | 223 MB
eLearning | Skill level: Intermediate

If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization’s network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.

Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council’s certification exam. This course maps to the 02 Footprinting and Reconnaissance domain.

Topics include:

  • Using competitive intelligence
  • Hacking with search engines
  • Using email for footprinting
  • Getting social
  • Mirroring websites
  • Using Ping, Tracert, nslookup, and dig
  • Taking footprinting countermeasures
  • Pen testing for footprinting
+ Table of Contents

1 Scouting the target
2 What you should know
3 Disclaimer
4 Footprinting and reconnaissance
5 Using competitive intelligence
6 Search engines and Google hacking
7 Getting social
8 Using AnyWho, Spokeo, and Yansi
9 Tracking online reputation
10 Website and email footprinting
11 Mirroring websites
12 Monitoring websites
13 Investigating email
14 OSINT tools
15 Footprinting network and DNS
16 Domain name generators
17 Understanding ICMP
18 Using Ping and Tracert
19 Analyzing the path
20 nslookup and dig
21 Footprinting countermeasures
22 Footprinting pen testing and reports
23 Next steps