Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Become an AI & ML Engineer with Cal Poly EPaCE — IBM-Certified Training
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced OSINT techniques for application security reconnaissance in this 51-minute conference talk from Derbycon 2015. Dive into the world of Recon-ng and beyond with Tim Tomes as he covers a wide range of topics including dark web assessments, impact analysis, code remediation, and data extraction. Learn how to leverage LinkedIn crawling, breach data analysis, and online vulnerability scanners for comprehensive security assessments. Discover the power of Google Dorks, GitHub searching, and the Google Hacking Database to uncover potential vulnerabilities. Gain valuable insights into debugging techniques and final thoughts on effective OSINT practices for improving application security.
Syllabus
Intro
Who am I
Caution
Recon ng
Darker the Assessment
Impact
Fix bad code
Contacts
Reconng Search
Show Modules
Show Domains
Extract Data
Profiles
LinkedIn Crawl
Breach Data
Technologies
How to do this
Online vulnerability scanners
Static vulnerabilities
Google Dorks
Search GitHub
Debugging Notes
Google Hacking Database
Final Thoughts