Videos

Published on June 28th, 2017 📆 | 3365 Views ⚑

0

OSINT & External Recon Pt. 1: Host Discovery – Tradecraft Security Weekly #8


iSpeech.org


During the reconnaissance phase of a penetration test being able to discover the external assets of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source techniques and tools it is possible to enumerate an organizations external assets without sending any data directly from your computer system to the target organization's subnets. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) discusses some of the tools and techniques that can be used to do this.

LINKS:
Recon-ng: https://bitbucket.org/LaNMaSteR53/recon-ng
Datasploit: https://github.com/DataSploit/datasploit
Spiderfoot: http://www.spiderfoot.net/
Censys: https://censys.io/
Shodan: https://www.shodan.io/
Threatcrowd: https://www.threatcrowd.org/
HackerTarget: https://hackertarget.com/
Netcraft: https://www.netcraft.com/
Certificate Search Tool - crt.sh
Internet-Wide Scan Data Repository - scans.io





Full Show Notes: https://wiki.securityweekly.com/TS_Episode08


2017-06-28 16:54:04

source

Tagged with:



Comments are closed.