Defender's Notes
search
Ctrlk
  • Welcome!
  • Methodology
  • Ethical Hacking
  • Resources/Blogs/Conferences/Labs
  • Writing Vulnerability Reports
  • Linux Tips
  • Certifications
  • Bug Bountychevron-right
  • Python
  • PenTesting
    • Recon
    • Network Scanning
    • Reverse Shell Payloads
    • API Security Testing
    • 53 - DNS
    • 21 - ftp
    • 139,445 - SMB
    • 111,2049 - rcpbind
    • Authentication
    • Scripting
    • OSINT
    • Cloud Security
    • Reverse Engineering
    • Password
    • Proxy Chain
    • Steganography
    • Buffer Overflow
  • Windows
    • Recon
    • Golden/Silver Ticket
    • PowerShell for Beginners
    • Windows Priv Escalatechevron-right
    • Kerberos Attack
  • Web Pentesting
    • 80,443,8080 - Recon
    • Resourceschevron-right
    • Web Vulnerabilitieschevron-right
    • OWASP Top 10 2017chevron-right
    • OOB
    • Java
    • Python Web Security
  • Linux
    • Upgrading shell
    • Linux Priv Escalatechevron-right
  • Binary Security
    • AOT
  • Hardware Security
    • Wi-fi
    • Radio
  • Mobile Security
    • Android
    • SMS
  • Videos
    • IppSec Videos
    • The Cyber Mentor
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. PenTesting

OSINT

Analyzing Analytics https://exploits.run/analytics-analysis-fbi/arrow-up-right

OSINT: Gathering Open-Source Security Data with Censys: https://www.hackers-arise.com/post/open-source-intelligence-osint-gathering-open-source-security-security-data-using-censysarrow-up-right

Extracting Employee Names from Companies on LinkedIn https://www.hackers-arise.com/post/2019/05/28/osint-part-3-extracting-employee-names-from-companies-tesla-and-breitbart-on-linkedinarrow-up-right

Red Siege - Recon Methods Part 1 - OSINT Host Discovery https://www.redsiege.com/blog/2020/02/recon-methods-part-1-osint-host-discovery/arrow-up-right

PreviousScriptingchevron-leftNextCloud Securitychevron-right

Last updated 5 years ago