CEH v11: Metadata Wordlists Email WHOIS & DNS Recon

placeholder

When you;re looking for useful target information you want to pull from every available source. In this course you;ll investigate how to gather and inspect metadata for possible sensitive info about a target. You;ll learn how to use wordlists for fuzzing and password attacks about the usefulness of custom wordlists and how to generate a wordlist based off the target web presence. Next you;ll examine how e-mail tracking systems can glean info like IP addresses geolocation and host operating systems. Finally you;ll learn about useful information that can be found using WHOIS and DNS service. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.