Coconote
AI notes
AI voice & video notes
Export note
Try for free
Lecture Notes on Cybersecurity Tools and Techniques
Jul 30, 2024
Lecture Notes on Cybersecurity Tools and Techniques
Disclaimer
This video is for educational purposes only.
Support the creator by not using ad blockers.
Overview of Social Media Tracking
Used Sherlock Hacker for social media accounts tracking.
Can find friends or others by using tracking methods.
Concepts Covered in Previous Parts
Basics of Operating Systems.
Virtual Installation.
Live Boot of Kali Linux.
Basic Commands in Kali.
Numeric to Binary Conversion.
Computer Memory Basics.
Introduction to IP Addressing:
Classful Addressing
: Predefined network and host portions.
Classless Addressing
: Flexible; no fixed subnet masks, allowing dynamic network allocation.
CIDR (Classless Inter-Domain Routing) introduced for more efficient IP address allocation.
Detailed Topics Covered
IP Addressing (Part 1 & 2)
Subnetting
: Understanding division of IP ranges into subnets; calculating hosts.
Total addresses in a subnet = 2^n, where n is the number of host bits.
MAC Addressing
: Physical address of a device, cannot be changed; useful for network tracking and security.
Tools for Information Gathering
Sherlock Hacker
: Used for finding social media accounts.
The Harvester
: To extract email addresses and personnel info from search engines.
Can be run via terminal commands.
Google Dorking
: Uses specific search queries to unveil hidden information.
OSINT Techniques
: Acquiring information from publicly available sources.
Advanced Information Extraction Tools
Photon
: Extracts information from websites, including directories and potentially sensitive files.
Spider Foot
: A tool for automating information gathering on various domains, IPs, etc.
G-Racon
: Easily performs scans for domain information.
FOCA
: Used for extracting metadata from documents and other files.
Scanners
: Network and vulnerability scanning techniques.
Social Engineering and Reconnaissance Techniques
Physical Recon
: Gathering data through physical presence (e.g., visiting a site).
Social Engineering
: Manipulating individuals to reveal confidential information.
Example: Convincing individuals on the grounds of job security to gain access.
Phishing Techniques
Tools such as
Pi Phisher
and
G-Phisher
to create custom phishing pages.
HT Track
: Clones websites for offline viewing; useful for phishing setups.
Practical Demonstrations
Potential Methods of Information Gathering
Extract details from images using
EXIF
data (GPS location, camera settings).
Web scraping public websites for usernames, addresses, and other data.
Closing Notes
Encouraged the importance of ethical hacking and cybersecurity practices.
Future videos will focus on penetration testing and vulnerability scanning.
Questions and Interaction
Invited viewers to add their questions or confusions in the comment sections for clarification.
Summary of Upcoming Parts
Expect new tools for website cloning, gathering metadata, and further networking topics.
End of Notes
📄
Full transcript