Red Team Reconnaissance Techniques

preview_player
Показать описание
In this video, I will be exploring the various active and passive reconnaissance techniques used for Red Team operations.

Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to the scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

-----------------------------------------------------------------------------------
LINKS:

TOOLS:
-----------------------------------------------------------------------------------

-----------------------------------------------------------------------------------

-----------------------------------------------------------------------------------

-----------------------------------------------------------------------------------

We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

-----------------------------------------------------------------------------------
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#RedTeam#CyberSecurity
Рекомендации по теме
Комментарии
Автор

0:00 - Intro
PASSIVE
5:52 - Gather general info about target (IP addresses, host name, firewall?, etc.)
8:12 - DNS information
19:30 - Website stack
24:40 - Employee info gathering
31:10 - Sub domain enumeration
ACTIVE
40:10 - Active sub domain enumeration
48:03 - Port scanning
51:04 - Vulnerability scanning
AUTOMATION
56:00 - Automated testing

redcloud
Автор

the first practical learning video on youtube

ThorAsh-zs
Автор

Awesome. I never see video like this on YouTube before. Thanks to you Sir. Lot of love from India. 🇮🇳

rudrasalaria
Автор

Hey Alex, thanks for great video, you are doing great job, I learn every time something new from your series.

netbin
Автор

You have just earned for yourself a new subscriber. Thanks for the red team playlist

RakilTheGoon
Автор

Loving the series! Thank you so much for such awesome and free tutorials. I'm really intrigued by your shell theme of yours. Could you please let me know which one is that?

TheFreezingTuberJosh
Автор

Your videos are very informative as always no doubt the best video 🔥 Love you brother 💯

RahulKumar-hqwm
Автор

You have just earned for yourself a new subscriber. Thanks for the red team playlis

sagorshil
Автор

What is ur favourite tool for automatic passive recon? Sn1per, Amass, Recong-NG...?

Thanks Sensei Alexis for this great course! U are a gret teacher!

korovamilkplus
Автор

Many Many THANX for sharing very very useful knowledge with

морс-фд
Автор

Link for complete playlist will be added advantage Alex . Also numbering the video will help to go in flow

sakibarkate
Автор

what did you think we were thinking at @12.29
😃

konfushon
Автор

Awesome content ❤️. Thanks a lot for this.

nvanu
Автор

Amazing video and very informative💯...pls Is there a way we can download the part 2 of this video...???

kennethnwaigwe
Автор

Have you ramped up your vid production since joining INE?

BobBob-qmbm
Автор

Is there any alternative for Part 2 because im accessing it in 2024 and the link in un-accessable

akashmore
Автор

U did an amazing job, thanks man 🙏🏻 what type of bash do you use?

mdev
Автор

Can you make a top-up video explaining how hackers are being tacked even after they use all the possible anonymity techniques?

HSN.LTD
Автор

Do we get the Trial API for all the database in theHarvester

KumarSiddappa-po
Автор

Hello, nice to talk to you, I want part2, but it have been delete, have you create any new link of part2?

bonglau