From the course: Deep Dive into Open-Source Intelligence
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Introduction to RIRs
From the course: Deep Dive into Open-Source Intelligence
Introduction to RIRs
- [Narrator] While ethical hacking sounds exciting, the only thing that makes you different from cyber criminals is that you have authorization. It's a fine line between being an ethical hacker and breaking the law. A colleague of mine once hacked into a router within the scope and rules of engagement agreed upon by him and his client. After getting access to the router things weren't making sense, and my colleague called his client to go over his findings. When he read back the IP address for the compromised router, the client apologized, and said he made a typo on the IP address. It quickly dawned on my colleague that he had just hacked into someone else's router and, to make things worse, the compromised router belonged to the US government. Ever since hearing my colleague's story, and how his client's mistake could have sent him to jail for a long time, I've been diligent about double checking the scope of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
Introducing domain names and DNS discovery2m 41s
-
Crawling websites to gather OSINT data3m 20s
-
Finding deleted information in web archives2m 9s
-
Introduction to using search engines for OSINT2m 11s
-
Google hacking or dorking for OSINT2m 22s
-
Discovering OSINT data in the dark web3m 7s
-
Introduction to RIRs2m 46s
-
-