Professional Documents
Culture Documents
Introduction To Ethical Hacking + OSINT PDF
Introduction To Ethical Hacking + OSINT PDF
Introduction to Ethical
Hacking + OSINT
However, there will still be much that is specific to pentesting and ethical hacking
that will be new. That is why you are going to need to practice good reading skills
and learn when you can skim/review topics, and when you need to pause and
deeply read a section.
For instance, chapter 1 will be primarily review with only a few sections that might
be new information for students.
You will not be asked to ever memorize a long list of tools—rather, you should
understand the objective (i.e. enumerate DNS, scrape a website, scan a network,
etc…) and why a ethical hacker might want that information. Tools come and go.
When you are reading, focus much on the first portion of a section, and then skim
through the tools.
However, there will be a handful of tools that you will be expected to know, and
they will be covered in-depth.
Reconnaissance
Maintaining
Gaining Access
Access
© Tobin Shields, M.S., M.Ed.
Introduction to
Footprinting/OSINT
© Tobin Shields, M.S., M.Ed.
“The Hacking Process” EC-Council
Reconnaissance
Maintaining
Gaining Access
Access
© Tobin Shields, M.S., M.Ed.
The “Recon” Phase
https://www.exploit-db.com/google-hacking-database
▸ Netcraft (Website)
▸ Sublist3r (Python Script)
▸ Fierce (Built into Kali)
Data Miner
Data Miner is a Google Chrome
extension that helps you scrape
data from web pages and into a
CSV file or Excel spreadsheet.
Link to download
Link to article
https://www.shodan.io/
https://amzn.to/2pTXdz1 https://amzn.to/339avqo