Red Team Reconnaissance Techniques
ฝัง
- เผยแพร่เมื่อ 29 ต.ค. 2021
- In this video, I will be exploring the various active and passive reconnaissance techniques used for Red Team operations.
Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to the scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.
Writeup: hackersploit.org/red-team-rec...
-----------------------------------------------------------------------------------
LINKS:
Register for part 2 (FREE!): event.on24.com/wcc/r/3464946/...
Get $100 in free Linode credit: login.linode.com/signup?promo...
MITRE ATT&CK Framework: attack.mitre.org/
TOOLS:
Sn1per: github.com/1N3/Sn1per
OWASP Amass: github.com/OWASP/Amass
-----------------------------------------------------------------------------------
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
-----------------------------------------------------------------------------------
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
-----------------------------------------------------------------------------------
CYBERTALK PODCAST ►► open.spotify.com/show/6j0RhRi...
-----------------------------------------------------------------------------------
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
-----------------------------------------------------------------------------------
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#RedTeam#CyberSecurity - วิทยาศาสตร์และเทคโนโลยี
0:00 - Intro
PASSIVE
5:52 - Gather general info about target (IP addresses, host name, firewall?, etc.)
8:12 - DNS information
19:30 - Website stack
24:40 - Employee info gathering
31:10 - Sub domain enumeration
ACTIVE
40:10 - Active sub domain enumeration
48:03 - Port scanning
51:04 - Vulnerability scanning
AUTOMATION
56:00 - Automated testing
Thnx bro
hero
You have just earned for yourself a new subscriber. Thanks for the red team playlist
Hey Alex, thanks for great video, you are doing great job, I learn every time something new from your series.
You have just earned for yourself a new subscriber. Thanks for the red team playlis
Your videos are very informative as always no doubt the best video 🔥 Love you brother 💯
Many Many THANX for sharing very very useful knowledge with us!!!!!!!!!
Awesome. I never see video like this on TH-cam before. Thanks to you Sir. Lot of love from India. 🇮🇳
RED Team Baby, Lets Go! You rock HS!
Awesome content ❤️. Thanks a lot for this.
thank you hackersploit 🥰
Brother you are amazing
Loving the series! Thank you so much for such awesome and free tutorials. I'm really intrigued by your shell theme of yours. Could you please let me know which one is that?
Its Terminator
awesome man!!!!!
Outstanding
Cheers Mr Alex
I'm happy to be hereeeee
thank you
Thanks for the content \o/
What is ur favourite tool for automatic passive recon? Sn1per, Amass, Recong-NG...?
Thanks Sensei Alexis for this great course! U are a gret teacher!
Link for complete playlist will be added advantage Alex . Also numbering the video will help to go in flow
Great!
Thank you
Respect ++ 💯✌️
Amazing video and very informative💯...pls Is there a way we can download the part 2 of this video...???
Have you ramped up your vid production since joining INE?
U did an amazing job, thanks man 🙏🏻 what type of bash do you use?
He already made a video on that do watch that .
he uses fish shell
Can you please recommend some red team books ?
what did you think we were thinking at @12.29
😃
Lol😆
Can you make a top-up video explaining how hackers are being tacked even after they use all the possible anonymity techniques?
So you are in muthaiga, should come and greet you.
Can you send a link to download the presentation?
Do we get the Trial API for all the database in theHarvester
Is that your custom kali is that a prebuilt image you got somewhere? I want it haha
Default Kali VM with a custom XFCE theme and icon pack.
@@HackerSploit nice. looks sick, especially the terminal. it looks ugly in the new releases
Do you cover blue team tactics???
We will work on a blue team series after the red team series is concluded.
@@HackerSploit Love your content bro. I'm learning a lot from your videos
Part 1?
please make a same type of video on exploitation and a tool called secgen please secgen is a project given to me and I can find nothing on youtube and google
I completely agree. A very useful tool
Hmmmm , why when we have meta2 and 3.
Reconnaissance Techniques in Ethical Hacking: Unveiling Vulnerabilities
10:00
12.29
Registered am I suppose to receive an email? I also would like to view the part 1 series
Part 1 will be released on TH-cam, registering will immediately open up the on-demand video player.
❤😍😍😍💋
21:39
Hello sir how you
12:27
Lmao you didn't-
Yo I am just mimicking all the commands same hope you will not take any action on me 😅.
We want part 1.........
These videos are part 1
@@HackerSploit okay
dont lie brother i see your brower history jokes
Funny how 99% of this tools wont even work most of the time.
All it takes is for it to work once. The task at hand.
It’s not the tools that makes a good hacker(popular opinion)
Thanks genius. If it was easy, everyone would do it
But all that sounds good but what is the HACKING SCRIPT RIIIGGHHT
LMFAO @12:30
So i see he hasnt posted in a year.. very odd for someone with 900k subs did he end up in prison 👀😅