What You Need to Know Before
You Start
Starts 9 June 2025 21:50
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
45 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore advanced reconnaissance techniques with int0x80 of Dual Core, focusing on innovative methods for gathering intelligence and enhancing cybersecurity strategies.
Syllabus
- Introduction to Cyber Reconnaissance
- Tools and Techniques for Reconnaissance
- Open Source Intelligence (OSINT) Gathering
- Network Enumeration and Scanning
- Web Application Reconnaissance
- Social Engineering and Human Reconnaissance
- Stealth and Evasion Techniques
- Real-world Case Studies
- Developing Cybersecurity Strategies
- Practical Exercises and Labs
- Capstone Project
- Conclusion and Future Trends
Overview of reconnaissance in cybersecurity
Importance and objectives of intelligence gathering
Introduction to common reconnaissance tools
Advanced tool configuration and usage
Analysis of tool outputs
Identifying valuable sources of public data
Automating OSINT processes
Ethical considerations in OSINT
Techniques for mapping network structures
Identifying active hosts and services
Bypassing network defenses
Gathering intelligence from web applications
Common vulnerabilities and exploitation methods
Use of web-specific reconnaissance tools
Understanding human factors in cybersecurity
Techniques for gathering intelligence through social engineering
Mitigation strategies
Techniques for hiding reconnaissance activities
Avoiding detection by defensive tools
Developing stealthy reconnaissance strategies
Analysis of successful reconnaissance operations
Lessons learned from cyber incidents
Integrating reconnaissance with cybersecurity planning
Enhancing incident response through intelligence
Building resilience through informed security measures
Hands-on use of reconnaissance tools
Simulated intelligence-gathering scenarios
Collaborative team exercises
Conduct a comprehensive reconnaissance operation on a simulated target
Develop and present a full report of findings and recommendations
Future developments in reconnaissance techniques
Emerging tools and methodologies in intelligence gathering
Subjects
Conference Talks