From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,500 courses taught by industry experts.

Learning objectives

Learning objectives

- Welcome to Lesson 13: Passive Reconnaissance and OSINT. In this lesson, you're going to gain an understanding of information gathering and vulnerability identification. You will also learn about the concepts and the techniques of open source intelligence, or OSINT. You're going to perform different DNS based passive reconnaissance exercises, and also, you're going to learn on how to identify cloud and self-hosted assets in an on-premise environment. You also going to go over different tools like Shodan, Maltego, AMass, Recon-NG, and many others. We're going to go over different password dumps, file metadata, and public source-code repositories that attackers and you as an ethical hacker can take advantage of to then get a foothold of a system or an organization. Then at the end, we're going to go over the concepts of Google hacking and search engine reconnaissance. Let's get started.

Contents