Skip to content

Latest commit

 

History

History
28 lines (23 loc) · 1.69 KB

README.md

File metadata and controls

28 lines (23 loc) · 1.69 KB

Red Team Recon

Lean how to use DNS, Advanced Searching, Recon-NG, and Maltego in order to collect information about our target!
Now we are about to get into the real work and learn how we can easily get intel on our target. By utilizing multiple tools, we can attempt to collect all types of information that will give us a boost in our attacks!
Why do we need to use Recon?
Recon work provides the foundation of our attack. If our target is using Apache 2.4.10, we can easily search for any potential vulnerabilities and exploits. And then execute those as well.
Another reason for Recon work is to try to extract sensitive information, such as login details and more!

T.H.M. Red Team Recon

We can all access this course here! I have put the notes & copied virtually everything inside of the RedTeamFundamentals.md file so that you can follow along.
I did the copy/paste of the entire course for my own personal gain. Why?
I have the room pulled up on 1 monitor, and wanted to read the information on my second monitor.

Contact & Support

I am here to help!
We all need some help sometimes. And maybe you would like to contribute to my knowledge! Either way, I enjoy connecting and making new friends!
Please feel free to connect with me here;
Email: [email protected]
Twitter: https://twitter.com/CryptoH4ck3r

If you enjoyed this content, please help support the creator! They are almost out of coffee!
BitCoin Wallet (Recieving):
3QVThxXUbV4uaKBBJP1bHahZH2iJhpmncT

Etherum Wallet (Recieving):
0x07a0d46097C63Ee7E66229821fc0115Bb0E2F424

Doge Wallet (Recieving):
DRjYNp9JGbkFSVL5tXQqbU6y8Wy99bJA8m