Getting Started in Cyber Security
Learn the basics of cyber security and how to embark on your own journey in this exciting field. Discover the essential skills and resources to kickstart your learning.
7/19/20231 min read
Learn the basics of cyber security and how to embark on your own journey in this exciting field. Discover the essential skills and resources to kickstart your learning.
Passive Reconnaissance Techniques
Penetration Testing Lab: Passive Reconaissance Techniques
Today's enlightening journey led me to delve into the realm of passive reconnaissance techniques, with a particular focus on manual tools like DNS look-up and SSL scanning in Kali Linux. These powerful tools provided me with a wealth of valuable information, uncovering intriguing domains and subdomains of interest. My exploration extended to utilizing the harvester tool, which proved to be an invaluable asset in extracting relevant data through Google searches. This hands-on experience has significantly deepened my understanding of passive reconnaissance and its potential applications in gathering critical intelligence.
For the past eight years, I have been honing my skills in conducting OSINT (Open-Source Intelligence) the old-fashioned way. My initiation into this art came during my early days in the military, and I was astonished by the vast amount of information that could be easily acquired without the target's knowledge. In today's world, where companies are increasingly prioritizing cybersecurity, it is alarming to see how inadvertently they provide information to potential adversaries through their job postings or even their employees' posts. A seemingly innocent post from a new employee about the installation of a new firewall could unknowingly become a vulnerability that gets leaked to lurking hackers. It serves as a stark reminder of the importance of being cautious and vigilant in this interconnected digital landscape.
