Course Curriculum

Before the course
(W00) Course Instructions 00:00:00
Module 1
(W40M01) DNS Enumeration 00:00:00
(W40M02) DNSSEC Analyzer & Passive Recon 00:00:00
(W40M03) ULRCrazy - Typosquatting attacks 00:00:00
(W40M04) URL Expanders 00:00:00
(W40M05) IP-Host-Hash automater 00:00:00
(W40M06) Harvesting email addresses 00:00:00
(W40M07) Email information gathering 00:00:00
(W40M08) Netcraft analytics 00:00:00
(W40M09) GHDB 00:00:00
(W40M10) Multiple web archives and cached data 00:00:00
(W40A01) Module 1 Exercise 1 - Harvesting Email Addresses 30, 00:00
(W40A02) Module 1 Exercise 2 - Using Google Dorks 30, 00:00
(W40A03) Module 1 Exercise 3 - Search for cached data 30, 00:00
(W40A04) Module 1 Exercise 4 - Gather the DNS records of grayhat.in 30, 00:00
(W40A05) Module 1 Exercise 5 - Automater for IP, URL, and hashes. 30, 00:00
Module 2
(W40M16) FOCA - Metadata 00:00:00
(W40M17) Metagoofil 00:00:00
(W40M18) Opanda PowerEXIF- Metadata for image 00:00:00
(W40M19) EDGAR - Company Insights 00:00:00
(W40M20) Get database server used in a company with a job site 00:00:00
(W40M21) Peekyou and lullar - People search 00:00:00
(W40M22) Maltego-CE – finding links and details with investigation 00:00:00
(W40M23) Facebook OSINT 00:00:00
(W40M24) Twitter OSINT and twofi 00:00:00
(W40M25) Reddit, Tinder, eBay, Craigslist 00:00:00
(W40A06) Module 2 Exercise 1: Database/server from job posting site 30, 00:00
(W40A07) Module 2 Exercise 2: Information/Metadata about picture 30, 00:00
(W40A08) Module 2 Exercise 3: Investigate the email using Maltego-CE 30, 00:00
(W40A09) Module 2 Exercise 4: Extract data using FOCA 30, 00:00
(W40A10) Module 2 Exercise 5: Make wordlist using twoFI 30, 00:00
Module 3
(W40M31) Exploit DB and SearchSploit 00:00:00
(W40M32) Global terrorism database 00:00:00
(W40M33) Hunting criminal records 00:00:00
(W40M34) Default passwords databases and lists 00:00:00
(W40M35) Digging into Darknet 00:00:00
(W40M36) Data leaks hunt - WikiLeaks 00:00:00
(W40M37) Live air traffic database 00:00:00
(W40M38) Mapping the fence like the intruders 00:00:00
(W40M39) Vehicle records and databases 00:00:00
(W40M40) Wieless network mapping 00:00:00
(W40M41) Cell phone towers and live cameras 00:00:00
(W40M42) Government data and employee details 00:00:00
(W40A11) Module 3 Assignments Exercise 1 - Investigate leaked data 30, 00:00
(W40A12) Module 3 Assignments Exercise 2 - Get flight data 30, 00:00
(W40A13) Module 3 Assignments Exercise 3 -Map the fence of a location 30, 00:00
(W40A14) Module 3 Assignments Exercise 4 - Find employees of an organization 30, 00:00
Module 4
(W40M47) Recon-ng - complete info data 00:00:00
(W40M48) Spiderfoot - Extracting information in a GUI 00:00:00
(W40M49) DiscoverScript - Multi-specialty hunter 00:00:00
(W40M50) Threat Intelligence 00:00:00
(W40M51) Shodan - Search engine for hackers 00:00:00
(W40M52) Mobile phone number details 00:00:00
(W40M53) Exploits and advisories 00:00:00
(W40M54) Bonus - Godfather of OSINT 00:00:00
(W40A15) Module 4 Exercise 1 - Search for vulnerable and outdated servers 30, 00:00
(W40A16) Module 4 Exercise 2 - Use Recon-ng on target site 30, 00:00
(W40A17) Module 4 Exercise 3 - Run DiscoverScript over a website 30, 00:00
Final Exam
(W40Q01) Final Exam 00:20:00
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023