🚀🚀Just Completed the Passive-Reconnaissance module on TryHackMe! I've heard many statements on buildingup strong base on reconnaissance techniques and grinding over OSINT. Finally, this is the first recon stay updated more yet to come!! 👨💻Enhanced my skills in:🔰Information gathering through shodan. 🔰 Better usage of SearchEngines.🔰 Deep-Dive in IP concepts. ✅️Getting ready to apply these skills in real-world scenarios and continue learning! #Cybersecurity #redteam #Reconnaissance#TryHackMe https://lnkd.in/gjhBG9W2
KHADER SHAREEF MADANI’s Post
More Relevant Posts
-
🕵️♂️ Excited to share that I've just completed the "Passive Reconnaissance" module on TryHackMe! 🎉 This eye-opening course has deepened my understanding of gathering information without direct interaction. Key learnings include: - 🌐 Mastering WHOIS lookups and DNS record analysis - 🗺️ Exploring digital footprints through search engines and social media - 📊 Utilizing online tools for comprehensive information gathering - 🏢 Understanding the importance of OSINT in cybersecurity - 🔍 Learning ethical considerations in reconnaissance activities Thrilled to add these crucial skills to my cybersecurity toolkit. 🛡️ #Cybersecurity #OSINT #PassiveReconnaissance #TryHackMe #EthicalHacking #InfoSec #ContinuousLearning #TechSkills
To view or add a comment, sign in
-
🌟 Day 9🌟 I deepened my understanding of passive reconnaissance techniques! In this room i explored key command-line tools and online services that gather data on targets without direct interaction. I learned to use: 🔹 whois for domain registration details 🔹 nslookup and dig for DNS record lookups, including A, MX, and TXT records 🔹 DNSDumpster and Shodan.io to uncover more about digital footprints These tools unlock a wealth of insights, especially once you become adept at refining search options and interpreting results. Every command and tool makes a difference in expanding the knowledge necessary for effective reconnaissance. #Cybersecurity #PassiveReconnaissance #Learning #tryhackme #pentesting
To view or add a comment, sign in
-
🚀 Just completed the Passive Reconnaissance module on TryHackMe! 🌐 Diving into the world of OSINT (Open Source Intelligence) was an eye-opener. I learned how to gather valuable information without directly interacting with a target, using tools and techniques to uncover hidden insights about domains, IP addresses, and more. Key takeaways: * Mastered various tools for data collection, including WHOIS and DNS queries. * Understood the importance of footprinting in cybersecurity. * Gained hands-on experience with real-world scenarios. Excited to apply these skills in future challenges! 🕵️♂️💻 #Cybersecurity #OSINT #TryHackMe #LearningJourney
To view or add a comment, sign in
-
Completed TryHackMe Labs: Deep Dive into Passive Reconnaissance 🌐🔍 | Leveraging tools like WHOIS, nslookup, dig, DNSDumpster, and Shodan to uncover critical information during OSINT investigations. Hands-on learning to master ethical and efficient reconnaissance techniques. #TryHackMe #CyberSecurity #PassiveReconnaissance
To view or add a comment, sign in
-
I am excited to announce that I have finished the Passive Reconnaissance Lab over in TryHackMe! 🚀 This was a fun and informative lab. I was able to pick up the skill of information gathering without directly connecting to host that is a key in cybersecurity. Here are some key highlights: Whois: How to read domain registration information Nslookup: This tool is used for the purpose to query DNS and get domain name or IP address mapping. Dig – DNS lookup utility for checking IP, CNAME and other records from nameservers DNSDumpster: Visualizing DNS Information to Find Subdomains and More I also liked taking the flags which added fun of sorts to learning. Ready to take what I have learned today and use it in my cybersecurity journey! This headline recently popped up and I thought there is no better time to start learning more about cybersecurity tools used for reconnaissance on compromised systems or servers. #cybersecurity #reconnaissance #tryhackme #learning #infosec #securitytools #cccybercampus TryHackMe
To view or add a comment, sign in
-
🚀 Just Completed a Passive Reconnaissance Module on TryHackMe! 🕵️♂️ I’m excited to share that I recently completed the passive reconnaissance module on TryHackMe. This experience has significantly enhanced my understanding of gathering information without directly interacting with the target. Here are a few key takeaways: 🔍 DNS Enumeration: Learned how to use tools like DNSDumpster to discover interesting subdomains beyond the usual suspects like www and blog. 🌐 WHOIS Lookup: Gained insights into domain registration details and how to interpret WHOIS data effectively. 🔧 Shodan.io Exploration: Discovered the importance of Shodan.io in identifying publicly accessible servers and common ports used by services like Apache and Nginx. This module has been a fantastic addition to my cybersecurity skill set, and I highly recommend it to anyone looking to deepen their knowledge in passive reconnaissance techniques. #CyberSecurity #InfoSec #TryHackMe #PassiveReconnaissance #LearningJourney
To view or add a comment, sign in
-
🚀 Excited to Share My Latest Achievement! 🚀 I've just completed the Passive Reconnaissance Challenge on TryHackMe.com! This challenge was a fantastic opportunity to deepen my understanding of passive information gathering techniques in cybersecurity. 🔍 What I Learned: Utilizing OSINT (Open Source Intelligence) tools Gathering information from public sources without alerting the target Analyzing digital footprints and identifying potential vulnerabilities 🌐 As I continue to advance my skills in the field of cybersecurity, this experience has been invaluable. I'm eager to apply these techniques in real-world scenarios and contribute to securing our digital landscape. 💡 If you have any tips or resources on passive reconnaissance, I'd love to hear them! Let's connect and share our cybersecurity journeys. #CyberSecurity #TryHackMe #PassiveReconnaissance #OSINT #InformationSecurity #ContinuousLearning
To view or add a comment, sign in
-
🎉 Excited to share that I’ve successfully completed the **Passive Reconnaissance** module on **TryHackMe**!. This module taught me how to gather valuable information about a target without direct interaction, using OSINT (Open Source Intelligence), DNS queries, WHOIS lookups, and more. It reinforced the importance of stealth and legality in the early stages of security assessments, providing crucial insights into a target’s digital footprint. I’m thrilled to continue expanding my cybersecurity knowledge and applying these skills in real-world scenarios! 🚀 #Cybersecurity #TryHackMe #OSINT #EthicalHacking #InfoSec
To view or add a comment, sign in
-
🚀 Exciting Milestone: Just Completed the Passive Reconnaissance Room on TryHackMe! 🎉 I’m thrilled to share that I've just wrapped up the Passive Reconnaissance room on TryHackMe! This experience has deepened my understanding of how to gather crucial information without raising any alarms. 🔍 Here’s What I Learned: Introduction to Reconnaissance: Understanding why it's a vital step in any cybersecurity assessment. 🛡️ Passive vs. Active Recon: Learning the nuances between stealthy info gathering and more direct approaches. 🤔 WHOIS: Gaining insights into domain ownership and registration details. 📇 nslookup and dig: Mastering these DNS query tools for effective reconnaissance. 🌐 DNSDumpster: Utilizing this tool to visualize and analyze DNS data. 🗺️ Shodan.io: Discovering the fascinating world of internet-connected devices and their potential vulnerabilities. 🖥️🔓 These skills are essential for anyone diving into the world of cybersecurity. I can’t wait to apply this knowledge in real-world scenarios! 💪✨ #Cybersecurity #EthicalHacking #TryHackMe #LearningJourney #InfoSec #ContinousLearning
To view or add a comment, sign in
Congratulations on completing the module! Your commitment to skill enhancement in cybersecurity is inspiring. Keep pushing forward!