1 00:00:11,440 --> 00:00:19,780 Beginning a career in ethical hacking and penetration testing can be a very exciting and most of the 2 00:00:19,780 --> 00:00:27,670 time our minds will be a bit overwhelmed, causing us to visit only the lectures about exploiting a 3 00:00:27,670 --> 00:00:31,780 system in its course such as this. 4 00:00:31,780 --> 00:00:37,870 So, however, conducting a penetration test is like starting a new project at home. 5 00:00:37,870 --> 00:00:46,390 Before you build a pool in your backyard, there are three things you must consider, such as the space 6 00:00:46,390 --> 00:00:53,640 that's available, the cost of materials, the contractors fees and other details. 7 00:00:53,650 --> 00:01:00,400 Information gathering is a very important phase of the hacking life cycle and penetration testing. 8 00:01:00,430 --> 00:01:06,070 In this lecture, we will focus on passive information gathering techniques and methods. 9 00:01:06,070 --> 00:01:14,600 We will learn how to use the Internet to get us the information and the specific details we need about 10 00:01:14,600 --> 00:01:21,770 our target by using both online resources and tools on Kali Linux. 11 00:01:24,430 --> 00:01:25,840 In this section. 12 00:01:25,840 --> 00:01:29,170 We will be covering these topics. 13 00:01:30,400 --> 00:01:33,280 Reconnaissance and footprinting. 14 00:01:34,390 --> 00:01:37,630 Understanding passive information gathering. 15 00:01:39,170 --> 00:01:40,430 Understanding. 16 00:01:40,430 --> 00:01:42,890 Open source intelligence. 17 00:01:43,900 --> 00:01:48,550 Using the top open source intelligent tools. 18 00:01:49,630 --> 00:01:55,300 We will also find the data leaks in cloud resources. 19 00:01:55,540 --> 00:02:03,280 We will understand who is and copying websites with httrack. 20 00:02:03,970 --> 00:02:08,810 We will also find sub domains using sub lister. 21 00:02:10,310 --> 00:02:16,250 We will also identify the target technologies and security controls.