Red Team Recon Techniques | Red Team Series 2-13

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=EA5f-5ZvxEA



Duration: 1:25:10
2,692 views
81


This guide is part of the HackerSploit Red Team series of guides. Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

Chapters:
0:00 Introduction
1:21 What is Reconnaissance?
3:34 Mitre Attack Recon Techniques Overview
4:50 Let’s Begin with Passive Reconnaissance
5:22 Using the host command
6:06 Using the nslookup command
6:28 Using the traceroute command
7:20 Using the dnsrecon command Passively
8:42 Using the wafw00f command
9:20 Using the dig command
12:48 Using the WHOIS Utility
13:48 Using Netcraft
16:13 Using DNS Dumpster
17:46 Using whatweb
20:59 Using Browser Addons
23:06 Gathering Employee Information
23:30 Using the Harvester
29:18 Subdomain Enumeration
38:29 Active Intelligence Gathering
38:40 Using dnsrecon Actively
40:57 Brute Forcing Subdomains with Fierce
43:30 Using knockpy
46:19 Using Port Scanning
49:20 Vulnerability Scanning
52:30 Directory Brute Forcing
54:17 Automating these Tests
56:38 Scanning with Sniper (Active)
58:30 Scanning with Sniper (Passively)
1:02:32 Using Amass - Basic Scan
1:08:14 Using Amass - Advanced Scan
1:10:58 Using the viz Subcommand
1:12:30 Viewing Reports
1:15:05 Performing Passive Recon with recon-ng
1:24:18 Conclusion

New to Linode? Get started here with a $100 credit β†’ https://www.linode.com/linodetube
Read the doc for more information on Caldera β†’ https://www.linode.com/docs/guides/red-team-reconnaissance-techniques/
Learn more about Hackersploit https://www.linode.com/docs/guides/hackersploit-red-team-series/
Subscribe to get notified of new episodes as they come out β†’ https://www.youtube.com/linode?sub_confirmation=1

#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; Hackersploit;




Other Videos By Akamai Developer


2022-04-05Running a basic Ansible Playbook installing Nginx #shorts
2022-04-04Windows Red Team Persistence Techniques | Red Team Series 5-13
2022-04-01RocketChat | Fast, Secure, Open Source Communication
2022-03-30Managing Your Own Databases is a Task of the Past with Linode's Managed Database Platform
2022-03-28Linux Red Team Exploitation Techniques | Red Team Series 4-13
2022-03-25Installing TensorFlow on an Ubuntu Server
2022-03-23Speed Up Your SSH Sessions with These Seven Quick SSH Config Tricks
2022-03-21Windows Red Team Exploitation Techniques | Red Team Series 3-13
2022-03-18Connect Your Docker Containers to Domain Names For Easy Access using Portainer on Linode
2022-03-16How to Reset SSH Host Keys when Deploying Linux Templates in Proxmox
2022-03-14Red Team Recon Techniques | Red Team Series 2-13
2022-03-11Linode Dedicated CPUs Explained | Dedicated vs Shared CPU Instances
2022-03-10Use Terraform for FAST Automated deployments #shorts
2022-01-24Manage Docker Containers from a Web UI with Yacht Interactive Dashboards
2022-01-21Choosing the Right Linux Distribution | Pros & Cons of the Top 7 Server Distros
2022-01-19aapanel is a Free and Open-Source Web Hosting Control Panel | Easy Install on Linode
2022-01-14Git on Linux Simplified | How to Setup Your First Repository and Use Version Control
2022-01-12How to use External Storage on Nextcloud with Linode's Super Fast NVMe Block Storage
2022-01-10Focalboard | Get You and Your Team Organized with this Open-Source Self Hosted Trello Alternative
2022-01-07Master the Linux Command Line: Background & Foreground Jobs to Swap Tasks with the fg and bg Command
2022-01-05Setting up a Minecraft Game Server on Linux is as Easy as Pie with Cloudron on your Linode



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
passive reconnaissance ethical hacking
active reconnaissance
hackersploit
nslookup command
traceroute command
dnsrecon command
wafw00f command
dig command
whois
netcraft
dns dumpster
whatweb
webalyzer
the harvester app
knockpy
port scanning tutorial
directory brute forcing
scanning with sniper
amass utililty
amass scanning
recon-ng utility
red team
information security