Getting Started in Cyber Security

Learn the basics of cyber security and how to embark on your own journey in this exciting field. Discover the essential skills and resources to kickstart your learning.

7/19/20231 min read

two bullet surveillance cameras attached on wall
two bullet surveillance cameras attached on wall

Learn the basics of cyber security and how to embark on your own journey in this exciting field. Discover the essential skills and resources to kickstart your learning.

Passive Reconnaissance Techniques

Penetration Testing Lab: Passive Reconaissance Techniques

Today's enlightening journey led me to delve into the realm of passive reconnaissance techniques, with a particular focus on manual tools like DNS look-up and SSL scanning in Kali Linux. These powerful tools provided me with a wealth of valuable information, uncovering intriguing domains and subdomains of interest. My exploration extended to utilizing the harvester tool, which proved to be an invaluable asset in extracting relevant data through Google searches. This hands-on experience has significantly deepened my understanding of passive reconnaissance and its potential applications in gathering critical intelligence.

For the past eight years, I have been honing my skills in conducting OSINT (Open-Source Intelligence) the old-fashioned way. My initiation into this art came during my early days in the military, and I was astonished by the vast amount of information that could be easily acquired without the target's knowledge. In today's world, where companies are increasingly prioritizing cybersecurity, it is alarming to see how inadvertently they provide information to potential adversaries through their job postings or even their employees' posts. A seemingly innocent post from a new employee about the installation of a new firewall could unknowingly become a vulnerability that gets leaked to lurking hackers. It serves as a stark reminder of the importance of being cautious and vigilant in this interconnected digital landscape.