Autoplay
Autocomplete
Previous Lesson
Complete and Continue
OSINT for Pentesters
0.0 Welcome to OSINT for Pentesters
0.1 What To Expect (1:27)
0.2 About The Instructor (1:16)
0.3 The Value Of OSINT In Pentesting (2:43)
0.4 What's Not Covered (2:56)
0.5 Prerequisites (3:31)
0.6 Browser Setup (9:20)
0.7 Browser Search (1:38)
0.8 OSINT Browser Extensions (11:10)
0.9 Sock Puppets (5:30)
0.10 OpSec Basics (7:10)
1.0 Corporate OSINT
1.1 Company Recon (7:23)
1.2 Gov Records (10:58)
1.3 Org Charts (7:42)
1.4 Tech Stack (5:49)
1.5 Geo Survey (3:57)
2.0 Reporting and Documentation
2.1 Mind Maps (5:02)
2.2 Note Taking (4:34)
2.3 Polished Report (7:51)
3.0 OSINT for Phishing
3.1 Domain Recon (17:41)
3.2 Finding Sub-Domains (6:51)
3.3 Sub Domain Enumeration (12:15)
3.4 Basic Email Discovery (4:23)
3.5 Email Breaches (9:42)
3.6 Email Probing (4:01)
3.9 Marketing Lists (4:24)
3.10 Login Methods (4:47)
3.11 Finding Lures (2:50)
Section Quiz
3.11 BONUS: Finding Clones (10:06)
4.0 Challenge 1
Challenge 1
Walkthrough (4:14)
5.0 OSINT for External Pentesting
5.1 Web App Pentesting (11:57)
5.2 External Pentesting (7:34)
5.3 Cloud Pentesting (10:48)
5.4 Find Leaky Buckets (4:45)
5.5 Wireless Pentesting (10:26)
Section Quiz
6.0 Challenge 2
Challenge
Solution
7.0 OSINT for Physical Pentesting
7.1 Virtual Lurking (6:30)
7.2 Analyzing Videos (8:29)
7.3 Floor Plans (3:44)
8.0 OSINT for Social Engineering
8.1 Convincing Pretexts (2:29)
8.2 Vishing Prep (2:13)
8.3 Voice Cloning (5:13)
8.4 Cherry Picking Information (1:45)
8.5 Backup Plan (4:28)
9.0 Challenge 3
Challenge
Solution
10.0 Conclusion
10.1 Final Thoughts (2:08)
10.2 What's Next (2:00)
10.3 Giving Back
10.4 Feedback
10.5 What are Your Thoughts of this Course?
10.5 What are Your Thoughts of this Course?
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock