“Recon Like an Adversary” by Jason Haddix at IWCON2023

  Рет қаралды 12,777

Infosec Studio by IW

Infosec Studio by IW

Күн бұрын

Jason Haddix is BuddoBot CISO & Hacker in Charge
We invited him as our speaker for IWCON 0x03 - The largest virtual Infosec conference of 2023.
He gave a talk on: Recon Like an Adversary
If you haven't attended the talk or want to rewatch it, here we present you the entire recording of his session.
Enjoy the talk and share with your Infosec buddies :)
Follow the speaker on Twitter / jhaddix
Get free $200 DigitalOcean credit for over 60 days here: m.do.co/c/a0983ce6e47f
For any queries, send us an email at contact@infosecwriteups.com or a DM on Twitter at @InfosecComm.
#security #cybersecurity #cloudhacking #IWCON #Infosec #infosecconference
Time Stamp
00:00 - Intro
03:43 Session Begins
53:00 : Q&A

Пікірлер: 15
@Mayurdusane
@Mayurdusane 4 ай бұрын
Thank you so much, Jason, for this talk.
@brunoeligiopavesi6987
@brunoeligiopavesi6987 5 ай бұрын
Jasons's content is always orginal and great
@boblehdafala8390
@boblehdafala8390 2 ай бұрын
you gat cool staff
@Bike1337
@Bike1337 6 ай бұрын
Awesome 👏
@jaylee5915
@jaylee5915 10 күн бұрын
hi when he said subfinder amass and B aught which tool did he refered to as bought
@gotr00t0day
@gotr00t0day 5 ай бұрын
You can use masscan to speed up things instead of nmap to scan the ip ranges that you get from asnmap
@jaylee5915
@jaylee5915 10 күн бұрын
hi when he said subfinder amass and B aught which tool did he refered to as bought
@CuriosityServer
@CuriosityServer 6 ай бұрын
Where can we get access to the presentation given by Jason?
@AliYar-Khan
@AliYar-Khan 6 ай бұрын
Yes I need it too
@mrkeemo1001
@mrkeemo1001 2 ай бұрын
Does anyone got the slides?
@miguelfrancisco7094
@miguelfrancisco7094 6 ай бұрын
hi guys, if the asn belongs to an ISP do u skip that part of recon? because from my understanding if the target does not have its own asn, it will be hard for the hunter to do a recon using the ISP's asn because the results of the recon will just give so many output that is not even related to the target because the asn is too large share ur insights on this matter, pls. thanks
@jaylee5915
@jaylee5915 10 күн бұрын
yes u skip coz the ipranges will include many out of scoope targets
@mamunwhh
@mamunwhh 3 ай бұрын
Where is bug🙄
@dhranamanthan492
@dhranamanthan492 2 ай бұрын
In my pocket😅
@hichemsavastano4430
@hichemsavastano4430 3 күн бұрын
It's recon bro it's not cve exploit or vulnerability scanning when u use recon u will find vuln
Modern Adversarial Reconnaissance - Long Live the External
40:43
SANS Offensive Operations
Рет қаралды 4,1 М.
One moment can change your life ✨🔄
00:32
A4
Рет қаралды 13 МЛН
100❤️
00:19
MY💝No War🤝
Рет қаралды 21 МЛН
1 or 2?🐄
00:12
Kan Andrey
Рет қаралды 57 МЛН
Perusing the Dark Web with Jason Haddix
1:00:15
The Cyber Mentor
Рет қаралды 9 М.
OSINT | How to Gather Information on ANYONE!
11:25
AI Video Hub
Рет қаралды 12 М.
I took The Bug Hunter's Methodology Live Course!
14:12
g0lden
Рет қаралды 1,7 М.
Top OSINT Tools in 2024 | Are These Too Creepy?
12:40
iMentor
Рет қаралды 109 М.
Motivation and Methodology with Sam Curry (Zlz) (Ep. 65)
2:29:06
Critical Thinking - Bug Bounty Podcast
Рет қаралды 5 М.
A REAL Day in the life in Cybersecurity in Under 10 Minutes!
9:33
Tech with Jono
Рет қаралды 228 М.
500k/yr as Full-Time Bug Hunter & Content Creator - Nahamsec (Ep. 53)
1:40:48
Critical Thinking - Bug Bounty Podcast
Рет қаралды 10 М.
КОМПОТ В СОЛО
0:16
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 9 МЛН
Когда покупки идут не по плану🤯
0:32
Эй Рамазан # DamirAgroDizel
0:16
DamirAgroDizel
Рет қаралды 6 МЛН
САМЫЙ ЖАРКИЙ ШТАТ (@therealoscarmendez - TT)
0:23
В ТРЕНДЕ
Рет қаралды 22 МЛН