Autoplay
Autocomplete
Previous Lesson
Complete and Continue
OSINT for Pentesters
0.0 Welcome to OSINT for Pentesters
0.1 What To Expect (1:27)
0.2 About The Instructor (1:16)
0.3 The Value Of OSINT In Pentesting (2:43)
0.4 What's Not Covered (2:56)
0.5 Prerequisites (3:31)
0.6 Browser Setup (9:20)
0.7 Browser Search (1:38)
0.8 OSINT Browser Extensions (11:10)
0.9 Sock Puppets (5:30)
0.10 OpSec Basics (7:10)
1.0 Corporate OSINT
1.1 Company Recon (7:23)
1.2 Gov Records (10:58)
1.3 Org Charts (7:42)
1.4 Tech Stack (5:49)
1.5 Geo Survey (3:57)
2.0 Reporting and Documentation
2.1 Mind Maps (5:02)
2.2 Note Taking (4:34)
2.3 Polished Report (7:51)
3.0 OSINT for Phishing
3.1 Domain Recon (17:41)
3.2 Finding Sub-Domains (6:51)
3.3 Sub Domain Enumeration (12:15)
3.4 Basic Email Discovery (4:23)
3.5 Email Breaches (9:42)
3.6 Email Probing (4:01)
3.9 Marketing Lists (4:24)
3.10 Login Methods (4:47)
3.11 Finding Lures (2:50)
Section Quiz
3.11 BONUS: Finding Clones (10:06)
4.0 Challenge 1
Challenge 1
Walkthrough (4:14)
5.0 OSINT for External Pentesting
5.1 Web App Pentesting (11:57)
5.2 External Pentesting (7:34)
5.3 Cloud Pentesting (10:48)
5.4 Find Leaky Buckets (4:45)
5.5 Wireless Pentesting (10:26)
Section Quiz
6.0 Challenge 2
Challenge
Solution
7.0 OSINT for Physical Pentesting
7.1 Virtual Lurking (6:30)
7.2 Analyzing Videos (8:29)
7.3 Floor Plans (3:44)
8.0 OSINT for Social Engineering
8.1 Convincing Pretexts (2:29)
8.2 Vishing Prep (2:13)
8.3 Voice Cloning (5:13)
8.4 Cherry Picking Information (1:45)
8.5 Backup Plan (4:28)
9.0 Challenge 3
Challenge
Solution
10.0 Conclusion
10.1 Final Thoughts (2:08)
10.2 What's Next (2:00)
10.3 Giving Back
10.4 Feedback
10.5 What are Your Thoughts of this Course?
5.2 External Pentesting
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock