وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Ethical Hacking: Footprinting and Reconnaissance

سرفصل های دوره

Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.


01 - Introduction
  • 01 - Scouting the target
  • 02 - What you should know
  • 03 - Hacking Ethically

  • 02 - Uncovering Information
  • 01 - Footprinting and Reconnaissance
  • 02 - Using Competitive Intelligence
  • 03 - Investigating Business Sites
  • 04 - Searching and Google Hacking
  • 05 - Employing Social Engineering
  • 06 - Gathering data on people
  • 07 - Tracking Online Reputation

  • 03 - Using Email and Websites
  • 01 - Harvesting Email Addreses
  • 02 - Examining Websites
  • 03 - Scraping Websites
  • 04 - Challenge Mirroring a website
  • 05 - Solution Mirroring a website
  • 06 - Monitoring websites

  • 04 - Searching the Network
  • 01 - Footprinting using DNS
  • 02 - Examining a Zone Transfer
  • 03 - Generating Domain Names
  • 04 - Determining the Path
  • 05 - Determining the Path

  • 05 - Discovering Reconnaissance tools
  • 01 - Using OSINT Tools
  • 02 - Investigating Email
  • 03 - Footprinting VoIP and VPNs
  • 04 - Going to the Dark Web
  • 05 - Exploring other footprinting tools

  • 06 - Footprinting Capstone
  • 01 - Conducting a Forensic Exercise
  • 02 - Examining an email
  • 03 - Diving into an email header
  • 04 - Verifying IP blocklists

  • 07 - Wrapping up the Recon
  • 01 - Guarding Social Media
  • 02 - Writing Footprinting Reports
  • 03 - Countering Footprinting
  • 04 - Next steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 27903
    حجم: 234 مگابایت
    مدت زمان: 116 دقیقه
    تاریخ انتشار: 17 دی 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید