Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools

  Рет қаралды 7,972

The CISO Perspective

The CISO Perspective

Күн бұрын

Reconnaissance is the first in the cyber security kill chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance, they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video, we'll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the kill chain.
Active Reconnaissance Overview, Methodology and Procedures 0:47
DNS Enumeration (dnsrecon & dnsenum) 1:47
SMTP Enumeration (netcat, snip-enum, swaks) 2:54
nMap Port Scanning Using Decoys 3:43
nMap Scripting Engine (NSE) 5:49

Пікірлер: 12
@iangeraris5202
@iangeraris5202 3 жыл бұрын
A truly non-bloated, to the point explanation! This channel surely deserves more recognition by the youtube algorithm! Looking forward to a deep dive on the other steps of the kill chain! Thanks for the videos!
@TheCISOPerspective
@TheCISOPerspective 2 жыл бұрын
Much appreciated! Thanks for watching
@Engleseee
@Engleseee 3 жыл бұрын
Eagerly waiting for the next video of cyber kill chain, It's a great tutorial, keep doing this
@cybersavage1337
@cybersavage1337 Жыл бұрын
Truly underrated channel. You are a goldmine of practical info sir.
@yave4algeria
@yave4algeria 2 жыл бұрын
This is my second video, I clicked the subscribe button imediately after the first video. Excellent content. Good luck
@bwogi
@bwogi 3 жыл бұрын
Informative, on point. The CISO perspective never disappoints. Kudos
@TheCISOPerspective
@TheCISOPerspective 3 жыл бұрын
Thank you! Really appreciate the support!
@irfanansari-ir5oq
@irfanansari-ir5oq Жыл бұрын
Your videos helps a lot covers all aspects in short time. Please upload more.
@bvreddy1074
@bvreddy1074 2 жыл бұрын
Couldn't be simplified better than this, excellent job, really really appreciate your time and efforts.
@TheCISOPerspective
@TheCISOPerspective 2 жыл бұрын
Thank you for supporting!
@folakeolorunnimbe6742
@folakeolorunnimbe6742 Жыл бұрын
Great Video! Definitely feel like I have learned something.
NextGen Firewall & IPS Evasion: 5 Defensive Techniques
11:38
The CISO Perspective
Рет қаралды 7 М.
Breaking The Kill Chain: A Defensive Approach
13:18
The CISO Perspective
Рет қаралды 153 М.
WHY DOES SHE HAVE A REWARD? #youtubecreatorawards
00:41
Levsob
Рет қаралды 37 МЛН
Red Team Reconnaissance Techniques
1:27:09
HackerSploit
Рет қаралды 114 М.
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
10:39
Securing SD-WAN: 5 Considerations
11:53
The CISO Perspective
Рет қаралды 11 М.
Real Hacking: Learn The Cyber Kill Chain
14:55
Cyberspatial
Рет қаралды 95 М.
Reconnaissance Phase
17:18
Dion Training
Рет қаралды 24 М.
The Iran Cyber Threat: What You Need To Know
6:42
The CISO Perspective
Рет қаралды 3,6 М.
Securing Your VPN: Six Considerations
7:02
The CISO Perspective
Рет қаралды 8 М.
What is XDR vs EDR vs MDR?  Breaking down Extended Detection and Response
8:54
The CISO Perspective
Рет қаралды 179 М.
How to Use Canary Tokens for Threat Hunting
7:23
The CISO Perspective
Рет қаралды 21 М.
Which Phone Unlock Code Will You Choose? 🤔️
0:14
Game9bit
Рет қаралды 13 МЛН
как спасти усилитель?
0:35
KS Customs
Рет қаралды 519 М.
Куда пропал 3D Touch? #apple #iphone
0:51
Не шарю!
Рет қаралды 942 М.