itsMe Posted June 10, 2023 Share Posted June 10, 2023 This is the hidden content, please Sign In or Sign Up About Course Active and Passive Reconnaissance and Dark Web Research What you’ll learnIs this live event for you? Learn how to stay safe while performing dark web research and reconnaissance Hands-on exercises so you can learn in real-time how to perform passive and active reconnaissance Learn from real bug bounty hunters This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT). In this training you will also learn how to perform dark web research and reconnaissance. You will learn how to use Tor, proxies and proxychains, and even how to create your own VPN servers in cloud environments. What will be Covered Day 1 Introduction to Passive Recon and OSINT (20 minutes) Using Recon-NG and SpiderFoot (30 minutes) Break: 10 minutes Using Shodan and the Shodan API (30 minutes) Using Maltego and the Harvester (30 minutes) Break: 10 minutes Introduction to Active Recon (20 minutes) Port and Vulnerability Scanning (30 minutes) Break: 10 minutes Subdomain Enumeration (20 minutes) Directory Enumeration (20 minutes) Account Enumeration 10 minutes Day 2 The Deep Web vs. the Dark Web (20 minutes) Introduction to Tor (20 minutes) Using the Tor Browser (20 minutes) Break: 10 minutes Using Proxies and Proxy Chains (20 minutes) Creating Your Own VPN Server in the Cloud (30 minutes) Break: 10 minutes Staying Safe when Performing Dark Web Research (50 minutes) Break: 10 minutes Performing Dark Web Reconnaissance (50 minutes) This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts