1 00:00:11,510 --> 00:00:12,440 Beginning. 2 00:00:12,440 --> 00:00:20,900 A career in ethical hacking and penetration testing can be a very exciting and most of the time our 3 00:00:20,900 --> 00:00:29,120 minds will be a bit overwhelmed, causing us to visit only the lectures about exploiting a system in 4 00:00:29,120 --> 00:00:31,900 its course such as this. 5 00:00:31,910 --> 00:00:39,380 So, however, conducting a penetration test is like a starting a new project at home before you build 6 00:00:39,380 --> 00:00:41,500 a pool in your backyard. 7 00:00:41,510 --> 00:00:49,460 There are three things you must consider, such as the space that's available the cost of materials, 8 00:00:49,460 --> 00:00:53,810 the contractors, fees and other details. 9 00:00:53,810 --> 00:01:00,500 Information gathering is a very important phase of the hacking lifecycle and penetration testing. 10 00:01:00,530 --> 00:01:06,230 In this lecture, we will focus on passive information gathering techniques and methods. 11 00:01:06,230 --> 00:01:14,630 We will learn how to use the Internet to get us the information and the specific details we need about 12 00:01:14,630 --> 00:01:21,800 our target by using both online resources and tools on Kali Linux. 13 00:01:24,650 --> 00:01:29,210 In this section, we will be covering these topics. 14 00:01:30,440 --> 00:01:33,320 Reconnaissance and food printing. 15 00:01:34,460 --> 00:01:37,670 Understanding passive information gathering. 16 00:01:39,270 --> 00:01:42,990 Understanding open source intelligence. 17 00:01:44,030 --> 00:01:48,620 Using the top open source intelligent tools. 18 00:01:49,640 --> 00:01:55,370 We will also find the data leaks in cloud resources. 19 00:01:55,820 --> 00:02:03,320 We will understand who is and copying websites with hash to track. 20 00:02:04,010 --> 00:02:08,900 We will also find sub domains using sub lister. 21 00:02:10,380 --> 00:02:16,290 We will also identify the target technologies and security controls.