Ethical Hacking Recon and the Dark Web
Published by Pearson
Active and Passive Reconnaissance and Dark Web Research
- Learn how to stay safe while performing dark web research and reconnaissance
- Hands-on exercises so you can learn in real-time how to perform passive and active reconnaissance
- Learn from real bug bounty hunters
This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT). In this training you will also learn how to perform dark web research and reconnaissance. You will learn how to use Tor, proxies and proxychains, and even how to create your own VPN servers in cloud environments.
What you’ll learn and how you can apply it
- Learn passive reconnaissance and OSINT techniques.
- Learn how to perform active reconnaissance for bug bounty hunting and ethical hacking engagements.
- Learn how to stay safe while performing dark web research and reconnaissance.
- Learn through step-by-step demonstrations.
- Complete hands-on exercises and participate in interactive discussions.
This live event is for you because...
- You have an understanding of cybersecurity fundamentals.
- You want to prepare for certifications such as OSCP, OSWE, GIAC Web Application Penetration Tester (GWAPT), GIAC Certified Incident Handler (GCIH), and the GIAC Exploit Researcher and Advanced Penetration Tester (GXPN).
- You want to learn how to perform reconnaissance for bug bounty and ethical hacking engagements.
- Anyone interested in cybersecurity, dark web research, and penetration testing (ethical hacking) will benefit from this training.
Prerequisites
- Course participants should have a basic understanding of cybersecurity, virtualization, and networking concepts.
Course Set-up
- The course setup instructions are documented at https://darknetrecon.com
Recommended Preparation
- Watch: The Complete Cybersecurity Bootcamp, 2nd Edition by Omar Santos
- Read: Developing Cybersecurity Programs and Policies, Third Edition by Omar Santos and Sari Greene
Recommended Follow-up
- Watch: The Art of Hacking Video Collection by Omar Santos, Ron Taylor, Jon Sternstein & Chris McCoy
- Watch: CompTIA PenTest+ (PT1-001) by Omar Santos
Schedule
The time frames are only estimates and may vary according to how the class is progressing.
Day 1
Introduction to Passive Recon and OSINT (20 minutes)
Using Recon-NG and SpiderFoot (30 minutes)
Break: 10 minutes
Using Shodan and the Shodan API (30 minutes)
Using Maltego and the Harvester (30 minutes)
Break: 10 minutes
Introduction to Active Recon (20 minutes)
Port and Vulnerability Scanning (30 minutes)
Break: 10 minutes
Subdomain Enumeration (20 minutes)
Directory Enumeration (20 minutes)
Account Enumeration 10 minutes
Day 2
The Deep Web vs. the Dark Web (20 minutes)
Introduction to Tor (20 minutes)
Using the Tor Browser (20 minutes)
Break: 10 minutes
Using Proxies and Proxy Chains (20 minutes)
Creating Your Own VPN Server in the Cloud (30 minutes)
Break: 10 minutes
Staying Safe when Performing Dark Web Research (50 minutes)
Break: 10 minutes
Performing Dark Web Reconnaissance (50 minutes)
Your Instructors
Omar Santos
Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs.
Joseph Mlodzianowski
Joseph Mlodzianowski is a twenty-five-year veteran of the cybersecurity field and considered a security aficionado by his peers. He is a traveler and adventurer. He is involved in M3AAWG Messaging Malware Mobile Anti-Abuse industry working group. Joseph is a Security Architect in Cisco’s Managed and Intelligence services. Joseph worked in/for the Department of Defense in various SME roles. He is also involved in the Cisco exam criteria and curriculum for certifications, and he has authored several books. You can also learn more about him on twitter @cedoxx or at darkwb.sh.