CEH v11: Footprinting Google Dorks Search Engines & Sub-domains

placeholder

Knowledge is power and in the ethical hacking game the more you know about your target the more likely you are to find a weakness in their security. In this course you;ll explore the practice of footprinting and the different types of information you can gather in this initial stage of attack. Next you;ll examine Google Dorks and some of the useful advanced search features of the Google search engine. You;ll learn how to use the Shodan Censys and Thingful search engines to find IoT and other Internet-connected hosts and services in order to see the larger attack surface of a target. Finally you;ll explore sub-domains and how they can lead to compromise if not properly managed as well as some tools that can help you enumerate a target sub-domains. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.